Spillage and Cloud Computing
|
|
|
- Silvester Alban Bridges
- 10 years ago
- Views:
Transcription
1 Spillage and Cloud Computing Presented to the Information Security and Privacy Advisory Board (ISPAB) A Review in Collaboration with the Federal Chief Information Council (FCIOC) Information Security and Identity Management Committee (ISIMC) Network and Infrastructure Security Sub Committee (NISSC) February 14, 2013
2 Purpose As the U.S. Government moves to use cloud computing, traditional methods for addressing the spillage of information may not be applicable in cloud computing The purpose of this briefing is provide a framework for the Chief Information Security Officers to develop policy and guidance for addressing spills in the cloud This briefing accomplishes this goal by Reviewing existing policy and guidance Summarizing the issues from a literature review Defining spillage in cloud computing Defining a spillage chain Defining use cases for the study of spillage Providing examples of how the spillage chain and use cases to study the implications of spillage in cloud computing Identifying recommendations 1
3 Definition of Spillage Considered data leakage/spillage definitions from CNSS ; SANS: 20 Critical Security Controls, and NIST SP , Rev 4 (Draft) NIST definition most appropriate Information spillage refers to instances where sensitive information (e.g., classified information, export-controlled information) is inadvertently placed on information systems that are not authorized to process such information. Such information spills often occur when information that is initially thought to be of lower sensitivity is transmitted to an information system and then is subsequently determined to be of higher sensitivity. At that point, corrective action is required. The nature of the organizational response is generally based upon the degree of sensitivity of the spilled information (e.g., security category or classification level), the security capabilities of the information system, the specific nature of contaminated storage media, and the access authorizations (e.g., security clearances) of individuals with authorized access to the contaminated system. *From NIST SP , Rev 4 (Draft) 2
4 Policy/Guidance Review Summary of Policy/Guidance Source NIST FedRAMP NIST CSA DHS 4300a Related Cloud Computing Summary Defines Security controls for Non-classified Federal information systems -Provides controls for three different risk levels (Low, Moderate, and High) -Number of controls increase as the risk level increases (Low is ~101, M ~174, & H ~215) -Divides controls into 18 security families; No specific security controls for Cloud Computing Lists the security controls and corresponding enhancements that Federal Agencies and Cloud Service Providers (CSPs) must implement within a cloud computing environment to satisfy FedRAMP requirements. The security controls and enhancements have been selected from the NIST SP Revision 3 catalog of controls. The selected controls and enhancements are for systems designated at the low and moderate impact information systems as defined in the Federal Information Processing Standards (FIPS) Publication 199. States a public cloud is one in which the infrastructure and computational resources that it comprises are made available to the general public over the Internet. It is owned and operated by a cloud provider delivering cloud services to consumers and, by definition, is external to the consumers organizations. - Provides security & privacy recommendations in the following areas (Governance, Compliance, Architecture, I&A Mgmt, Trust, S/W Isolation, Data Protection, Availability, & Incident Response) Lists the top seven threats to Cloud Computing Implementations: Threat #1: Abuse and Nefarious Use of Cloud Computing, Threat #2: Insecure Interfaces and APIs, Threat #3: Malicious Insiders, Threat #4: Shared Technology Issues, Threat #5: Data Loss or Leakage, Threat #6: Account or Service Hijacking, Threat #7: Unknown Risk Profile Based upon the NIST security controls, but does not specifically address Cloud Computing or Virtualization security issues. Page 3
5 Literature Review Cloud Computing Complicates Clean-Up Cloud-based office automation Document storage is in the cloud outside organization s boundary Cleaning more difficult than for data on a user s computer Cloud-based collaboration services Collaboration tools store data in the cloud outside organization s boundary Cleaning more difficult than for data on an organization s internal servers Possibility of collateral contamination of provider or other consumer resources Cloud-based search Often use inverted indices that include all terms in the source document Index may be contaminated by a data spill Cleaning the index may be more difficult than cleaning the data Cleaning the index may affect system availability and performance 4
6 Literature Review Should the Provider be Informed? Traditional advice: Do NOT tell the Internet Service Provider there has been a spill Limit knowledge of spill to contain impact Cloud service providers offer services that include longterm persistent storage Can this be effectively cleaned without provider involvement? The answer to this question may depend on the service model and the provider s specific implementation of the service model IaaS and PaaS Provider may not need to be informed if cleaning virtual storage resources is effective Specifics on virtual-to-physical resource relationships may affect effectiveness - Understanding these relationships requires information from the provider SaaS Detailed knowledge of application implementation details needed to determine cleaning approach Provider involvement likely necessary 5
7 Literature Review Observations (1 of 2) Academic research focuses on Preventing spills by reducing the likelihood of user mistakes that result in data spills Tracing a spill back to the person responsible Commercial products focus on Marking information to indicate sensitivity Preventing spills using filtering technologies at organizational boundaries Government guidance focuses on Assessing the scope and impact of a spill Eradicating spilled data 6
8 Literature Review Observations (2 of 2) Cloud computing Blurs or eliminates boundaries potentially reducing effectiveness of filtering technologies Complicates assessing scope and impact of a spill due to possible collateral contamination of other cloud consumers with no relationship to the government Complicates the eradication of spilled data due to potential need to involve the provider and other consumers affected by collateral contamination Prevention should receive more emphasis Use of spill prevention techniques may be more important because of the impact of cloud computing on remediation techniques 7
9 Spill Chain for Analyzing Spillage Activities Prevent: Reduce the likelihood of user mistakes that can lead to a spill. Assess: Determine whether a data spill has actually occurred, the sensitivity of the information potentially compromised, and the number of users, systems and applications involved. Contain: Identify all information hardware and software systems and applications affected, and execute approved procedures to ensure that the data spilled does not propagate further. Eradicate: When authorized execute approved sanitization procedures using approved utilities to permanently remove the data spilled from contaminated information systems, applications, and media. Recover: Use a clean backup media, as-built documentation and approved procedures to recover and restore all affected information systems and applications to an accredited, secure configuration. Attribute: Determine the source of the spill and take remedial action Prevent Contain Recover Assess Eradicate Attribute 8
10 Sample Use Cases for Analyzing Spillage in the Cloud Use Case Web-based Desktop Storage Big Data Analytics Knowledge Systems for Data Inter-Agency Collaboration Description Web-based desktop environment or applications. Google mail/apps is an example. Storing data in cloud environment as a means for long term record retention or for disaster recovery. Carbonite is example. Big data analytics distributed across large computation systems. Examples include physics calculations for CERN or weather calculations for NOAA. Storage and retrieval using meta data and search engines. Examples include library of congressional testimony and Lexis/Nexis. Using resources that are temporarily necessary for business partners or other agency collaborations. 9
11 Example Spill Chain for Analyzing Web-Based Desktop Public SaaS Implementation Prevent Provider must implement prevent capabilities within the desktop applications Assess Provider participation required Other consumer participation may be required Contain Provider participation required Eradicate Provider participation will be required to provide implementation information needed to determine if userlevel cleaning is adequate Recover Provider will likely have to perform recovery operations Other consumers may be affected by recovery operations Attribute May require capabilities within the desktop applications to include attribution information in documents and Provider participation may be required 10
12 Example Spill Chain for Analyzing Storage Public SaaS Implementation Prevent Provider must implement privacy capabilities such as encryption within the storage software (in rest and transit) Assess Provider participation required Other consumer participation may be required Contain Provider participation required Other consumers may be impacted Eradicate Provider participation will be required to provide implementation information needed to determine if userlevel cleaning is adequate Recover Provider will likely have to perform recovery operations Other consumers may be affected by recovery operations Attribute May require capabilities within the storage software to track attribution characteristics (username/password, PIV/CAC) Provider participation may be required 11
13 Example Spill Chain for Analyzing Big Data Analytics Community PaaS Implementation Prevent Consumer or community member must implement security prevention capabilities within applications, such as access control on libraries Assess Consumer and provider participation required Other community member participation may be required Contain Consumer and provider participation required Eradicate Consumer and provider participation will be required to work together on implementation of eradication procedures Recover Consumer and provider have to work together to perform recovery operations Other community members may be affected by recovery operations Attribute Consumer and provider participation work together. 12
14 Example Spill Chain for Analyzing Knowledge Systems Community SaaS Implementation Prevent Provider must implement prevent capabilities within the desktop applications Assess Provider participation required Other consumer participation may be required Contain Provider participation required Eradicate Provider participation will be required to provide eradication procedures, and implement clean up within provider control Recover Provider will likely have to perform recovery operations Other community members may be affected by recovery operations Attribute May require capabilities within the search and data capabilities to include attribution information, such as username and passwords Provider participation may be required 13
15 Example Spill Chain for Analyzing Inter-Agency Collaboration Community IaaS Implementation Prevent Consumer or community member must implement security prevention capabilities within applications, such as access control on libraries Assess Consumer and provider participation required Other community member participation may be required Contain Consumer and provider participation required Eradicate Consumer and provider participation will be required to work together on implementation of eradication procedures Recover Consumer and provider have to work together to perform recovery operations Other community members may be affected by recovery operations Attribute Consumer and provider participation work together. 14
16 Example Spill Chain for Analyzing NIST Control Areas Spill Chain Elements Prevent Assess Security Control Areas (As Defined by NIST ) Access Control (AC): Defines who or what is granted permission to access to a system or system component (especially on security enforcement) Configuration Management (CM): Documents the proper configuration for the system and its components to support its mission and protect itself from harm Audit and Authorization (AU): Identifies if a data spillage occurred and the users (who or what) involved Contain System Connectivity (SC): Identifies what external systems and information were potentially affected System and Information Integrity (SI): Identifies what internal systems, information sets, and components were potentially affected Eradicate Incident Response (IR): Defines the organization s response to a spill Recovery Contingency Planning (CP): Defines the process for responding to identified data/system loss scenarios Attribution Identification and Authentication (IA): Identifies who or what caused the spill Page 15
17 Example Use Cases for Analyzing the Impact on Security Controls Use Case Name Web-based Desktop Storage Big Data Analytics Knowledge Systems for Data Inter-Agency Collaboration Applying Security Control: AC-5 Separation of Duties Partial Expectation is the application and the underlying system infrastructure will play roles in addressing this control. For example, the application could provide user authentication and the system provide the reduction of the system audits. Partial Expectation is the environment (e.g., the data farm) would track when data was delivered/stored, but the application ISSO would be responsible for maintaining an inventory of what was stored. Fully Expectation is the application would completely address the security concerns. This is important information whose integrity must be maintained. Not Addressed Expectation is the application or environment does not address this security concern. As they don t validate the data, they may rely on others to implement security duties. Partial The security duties would be identified and shared per the Information Security Agreement (ISA). The applied rating system is: Fully used when the application or environment is expected to completely address/resolve the security control, Partial - used if the application or environment requires assistance from another source (e.g., another application or the environment), and Not Addressed used if the application or environment has no expectation to address/resolve the security control. Page 16
18 Recommendations Refine draft use cases for typical government use of cloud computing Identify cloud service/deployment model combinations that can support each use case, e.g. Web-based desktop environment Public or Community SaaS Determine how each activity in the Spill Chain is affected by each service/deployment model combination for each use case Develop guidance based on the results on this analysis 17
19 Roger Seeholzer Information Security Office US Department of Homeland Security THANK YOU QUESTIONS? 18
20 SUPPLEMENTAL MATERIAL 19
21 Policy/Guidance Review Reviewed Documents Homeland Security Presidential Directive 12 (HSPD-12): Policy for a Common Identification Standard for Federal Employees and Contractors (dated 27 August 2004) Data Leakage Threats and Mitigation (Published by the SANS Institute InfoSec Reading Room, 15 Oct 2007) SANS: 20 Critical Security Controls (Version 3.1), Critical Control 17: Data Loss Prevention ( viewed 9 Jul 12) NIST Special Publications , Recommended Security Controls for Federal Information Systems and Organizations (Rev 3, August 2009) NIST SP , Guidelines on Security and Privacy in Public Cloud Computing (24 Jan 2012) DHS 4300A, DHS Sensitive Systems Policy Directive 4300A (Version 8.0, 14 Mar 2011) DHS Security Architecture Appendix: Secure Cloud Computing (Draft Version 0.13, 17 May 2012) Cloud Security Alliance published cloud security documents (e.g., Top Threats to Cloud Computing v1.0, 2010; Security Guidance, 2011; Cloud Controls Matrix, 2011) Virtualization Security Best Practices, DHS OCIO ESDO (Jan 2010) CNSS , August 2007, Frequently Asked Questions (FAQ) on Incidents and Spills 20
22 Literature Review Relevant Articles Ankit Argarwal, Mayur Gaikwad, Kapil Garg, and Vahid Inamdar; Robust Data Leakage and Filtering System; 2012 International Conference on Computing, Electronics and Electrical Technologies. S. Subashini and V. Kavitha; A Survey on Security Issues in Service Delivery Models of Cloud Computing; Journal of Network and Computer Applications 34 (2011) Qihua Wang and Hongxia Jin; Data Leakage Mitigation for Discretionary Access Control in Collaboration Clouds; Association for Computing Machinery Stan Wisseman; Cloud Computing Security; Booz, Allen, and Hamilton; December 9, Committee on National Security System (CNSS); National Instruction on Classified Information Spillage; CNSS Instruction No. 1001; February Panagiotis Papdimitriou and Hector Garcia-Molina; Data Leakage Detection; IEEE Transactions on Knowledge and Data Engineering; Vol. 23; No. 1; January George Lawton; New Technology Prevents Data Leakage; IEEE Computer Society; September Sarah Jane Hughes; Payments Data Security Breaches and Oil Spills: What Lessons Can Payments Security Learn from the Laws Governing Remediation of the Exxon Valdex, Deepwater Horizon, and Other Oil Spills?; Maurer School of Law: Indiana University; January 1, Igor Burdonov, Alexander Kosachev, and Pavel Iakovendo; Virtualization-Based Separation of Privilege: Working with Sensitive Data in Untrusted Environments; Association of Computing Machinery; March 31, Anna Squicciarini; Smitha Sundareswaran; and Dan Lin; Preventing Information Leakage from Indexing in the Cloud; 2010 IEEE 3 rd International Conference on Cloud Computing. CNSS, Frequently Asked Questions (FAQ) on Incidents and Spills; CNSS ; August Dealing with Data Spillages; Downloaded July 20,
23 Policy/Guidance Review Selected Security Controls Spillage in Cloud Computing (1 of 2) Security Controls Security Controls AC-1 Access Control Policy and Procedures IA-1 Identification and Authentication Policy and Procedures AC-3 Access Enforcement IA-3 Device-to-Device Identification and Authentication AC-4 Information Flow Enforcement IA-5 Authenticator Management AC-5 Separation of Duties IA-7 Cryptographic Module Authentication AC-7 Unsuccessful Login Attempts IR-1 Incident Response Policy and Procedures AC-10 Concurrent Session Control IR-3 Incident Response Testing AC-17 Remote Access IR-5 Incident Monitoring AC-22 Publicly Accessible Content IR-8 Incident Response Plan AU-1 Audit and Accountability Policy and Procedures IR-9 Information Spillage Response AU-3 Content of Audit Records SC-1 System Connectivity Policy and Procedures AU-5 Response to Audit Processing Failures SC-3 Security Function Isolation AU-7 Audit Reduction and Report Generation SC-5 Denial of Service Protection AU-9 Protection of Audit Information SC-8 Transmission Integrity AU-11 Audit Record Retention SC-10 Network Disconnect CM-1 Configuration Management Policy and Procedures SC-`13 Cryptographic Protection CM-3 Configuration Change Control SC-15 Collaborative Computing Devices CM-5 Access Restrictions for Change SC-18 Mobile Code CM-4 Security Impact Analysis SC-24 Fail in Known State CM-7 Least Functionality SC-32 Information System Partitioning CM-9 Configuration Management Plan SC-41 Process Isolation CP-2 Contingency Plan SI-2 Flaw Remediation CP-4 Contingency Plan Testing SI-4 Information System Monitoring CP-7 Alternate Processing Site SI-6 Security Function Verification CP-9 Information System Backup SI-7 Software, Firmware, and Information Integrity CP-11 Predictable Failure Prevention Page 22
24 Policy/Guidance Review Selected Security Controls Spillage in Cloud Computing (2 of 2) Selected moderate-impact NIST , Rev 3 and Rev 4 security controls relevant to spillage in the cloud using: DHS Virtualization Security Best Practices recommendations SANS Critical Control 17: Data Loss Prevention Review of new controls in NIST , Rev 4 23
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
Security and Privacy Controls for Federal Information Systems and Organizations
NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems JOINT TASK FORCE TRANSFORMATION INITIATIVE This document contains excerpts from NIST Special Publication
Cloud Security for Federal Agencies
Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
Cloud Security. DLT Solutions LLC June 2011. #DLTCloud
Cloud Security DLT Solutions LLC June 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) [email protected] www.dlt.com/cloud Your Hosts Van Ristau Chief Technology Officer, DLT Solutions
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.
Federal CIO Council Information Security and Identity Management Committee (ISIMC) Guidelines for the Secure Use of Cloud Computing by Federal Departments and Agencies DRAFT V0.41 Earl Crane, CISSP, CISM
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy
Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program
U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program Report.
Industrial Security Field Operations
Defense Security Service Industrial Security Field Operations NISP Authorization Office (NAO) (Formerly Office of the Designated Approving Authority) NISPOM to NIST (800-53r4) Security Control Mapping
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer
IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan
CONTINUOUS MONITORING
CONTINUOUS MONITORING Monitoring Strategy Part 2 of 3 ABSTRACT This white paper is Part 2 in a three-part series of white papers on the sometimes daunting subject of continuous monitoring (CM) and how
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
CMS POLICY FOR THE INFORMATION SECURITY PROGRAM
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS POLICY FOR THE INFORMATION SECURITY PROGRAM FINAL Version 4.0 August 31, 2010 Document Number: CMS-CIO-POL-SEC02-04.0
Security Control Standard
Department of the Interior Security Control Standard Maintenance January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information Officer
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
Security Language for IT Acquisition Efforts CIO-IT Security-09-48
Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat Centers for Disease and Prevention National Center for Chronic Disease Prevention and Health
Security Controls Assessment for Federal Information Systems
Security Controls Assessment for Federal Information Systems Census Software Process Improvement Program September 11, 2008 Kevin Stine Computer Security Division National Institute of Standards and Technology
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -
45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART
Security Self-Assessment Tool
Security Self-Assessment Tool State Agencies Receiving FPLS Information, 7/15/2015 Contents Overview... 2 Access Control (AC)... 3 Awareness and Training (AT)... 8 Audit and Accountability (AU)... 10 Security
VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY. Version 2.
VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY Version 2., 2012 Revision History Version Date Purpose of Revision 2.0 Base Document 2.1 07/23/2012 Draft 1 Given to ISO for Review 2.2 08/15/2012
Cloud Security and Managing Use Risks
Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access
Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples The
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
Altius IT Policy Collection Compliance and Standards Matrix
Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy
System Security Certification and Accreditation (C&A) Framework
System Security Certification and Accreditation (C&A) Framework Dave Dickinson, IOAT ISSO Chris Tillison, RPMS ISSO Indian Health Service 5300 Homestead Road, NE Albuquerque, NM 87110 (505) 248-4500 fax:
IT Security Management Risk Analysis and Controls
IT Security Management Risk Analysis and Controls Steven Gordon Document No: Revision 770 3 December 2013 1 Introduction This document summarises several steps of an IT security risk analysis and subsequent
DIVISION OF INFORMATION SECURITY (DIS)
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new
INFORMATION TECHNOLOGY SECURITY POLICY 60-702. Table of Contents
Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE INSTRUCTION 60-702 December 21, 2009 Information Technology INFORMATION TECHNOLOGY
PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name]
PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name] [Date] [Location] 1 Prepared by: [Author] [Title] Date Approved by: [Name] [Title] Date 2
Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12
Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General
Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance
WHITE paper Complying with the Federal Information Security Management Act How Tripwire Change Auditing Solutions Help page 2 page 3 page 3 page 3 page 4 page 4 page 5 page 5 page 6 page 6 page 7 Introduction
Is it Time to Trust the Cloud? Unpacking the Notorious Nine
Is it Time to Trust the Cloud? Unpacking the Notorious Nine Jonathan C. Trull, CISO, Qualys Cloud Security Alliance Agenda Cloud Security Model Background on the Notorious Nine Unpacking the Notorious
Complying with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 An Assessment of Cyber-Ark's Solutions
Complying with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 An Assessment of Cyber-Ark's Solutions z September 2011 Table of Contents EXECUTIVE SUMMARY... 3 CYBER-ARK
HIPAA Security Matrix
HIPAA Matrix Hardware : 164.308(a)(1) Management Process =Required, =Addressable Risk Analysis The Covered Entity (CE) can store its Risk Analysis document encrypted and offsite using EVault managed software
Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
Security Control Standard
Department of the Interior Security Control Standard Risk Assessment January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information
Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto
Cloud Computing: What needs to Be Validated and Qualified Ivan Soto Learning Objectives At the end of this session we will have covered: Technical Overview of the Cloud Risk Factors Cloud Security & Data
Final Audit Report -- CAUTION --
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Audit of the Information Technology Security Controls of the U.S. Office of Personnel Management
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS
TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2
Office of Inspector General
Office of Inspector General DEPARTMENT OF HOMELAND SECURITY U.S. Department of Homeland Security Washington, DC 20528 Office of Inspector General Security Weaknesses Increase Risks to Critical DHS Databases
COORDINATION DRAFT. FISCAM to NIST Special Publication 800-53 Revision 4. Title / Description (Critical Element)
FISCAM FISCAM 3.1 Security (SM) Critical Element SM-1: Establish a SM-1.1.1 The security management program is adequately An agency/entitywide security management program has been developed, An agency/entitywide
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
Security from a customer s perspective. Halogen s approach to security
September 18, 2015 Security from a customer s perspective Using a cloud-based talent management program can deliver tremendous benefits to your organization, including aligning your workforce, improving
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
STATE OF NEW JERSEY Security Controls Assessment Checklist
STATE OF NEW JERSEY Security Controls Assessment Checklist Appendix D to 09-11-P1-NJOIT P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 Agency/Business (Extranet) Entity Response
08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview
Data protection and compliance In the cloud and in your data center 1 November 2013 Agenda 1 Introduction 2 Data protection overview 3 Understanding the cloud 4 Where do I start? 5 Wrap-up Page 2 Data
Homeland Security Virtual Assistance Center
for the Homeland Security Virtual Assistance Center November 3, 2008 Contact Point Donald M. Lumpkins National Preparedness Directorate (FEMA) (202) 786-9754 Reviewing Official Hugo Teufel III Chief Privacy
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS 1. Purpose This directive establishes the Department of Homeland
For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.
For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.com 844-644-4600 This publication describes the implications of HIPAA (the Health
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
Minimum Security Requirements for Federal Information and Information Systems
FIPS PUB 200 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Minimum Security Requirements for Federal Information and Information Systems Computer Security Division Information Technology Laboratory
How To Get The Nist Report And Other Products For Free
National Institute of Standards and Technology (NIST) The Information Technology Lab Computer Security Division (893) Now What? What does NIST have for you to use and how do you get it? How do you contact
Seeing Though the Clouds
Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating
Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)
Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)
ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT
INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA AND PACIFIC OFFICE ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT DRAFT Second Edition June 2010 3.4H - 1 TABLE OF CONTENTS 1.
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected]. Agenda. Security Cases What is Cloud? Road Map Security Concerns
BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected] Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad
Cloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE
STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE HOUSE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON INFORMATION TECHNOLOGY AND SUBCOMMITTE
Requirements For Computer Security
Requirements For Computer Security FTA/IRS Safeguards Symposium & FTA/IRS Computer Security Conference April 2, 2008 St. Louis 1 Agenda Security Framework Safeguards IT Security Review Process Preparing
Security Control Standards Catalog
Security Control Standards Catalog Version 1.2 Texas Department of Information Resources April 3, 2015 Contents About the Security Control Standards Catalog... 1 Document Life Cycle... 1 Revision History...
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
HIPAA Security. 5 Security Standards: Organizational, Policies. Security Topics. and Procedures and Documentation Requirements
HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
POLICY ON WIRELESS SYSTEMS
Committee on National Security Systems CNSSP No. 17 January 2014 POLICY ON WIRELESS SYSTEMS THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION CHAIR
POSTAL REGULATORY COMMISSION
POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
VA Office of Inspector General
VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2013 May 29, 2014 13-01391-72 ACRONYMS AND
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
Healthcare Compliance Solutions
Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and
NARA s Information Security Program. OIG Audit Report No. 15-01. October 27, 2014
NARA s Information Security Program OIG Audit Report No. 15-01 October 27, 2014 Table of Contents Executive Summary... 3 Background... 4 Objectives, Scope, Methodology... 7 Audit Results... 8 Appendix
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
HHS Information System Security Controls Catalog V 1.0
Information System Security s Catalog V 1.0 Table of Contents DOCUMENT HISTORY... 3 1. Purpose... 4 2. Security s Scope... 4 3. Security s Compliance... 4 4. Security s Catalog Ownership... 4 5. Security
When Security, Privacy and Forensics Meet in the Cloud
When Security, Privacy and Forensics Meet in the Cloud Dr. Michaela Iorga, Senior Security Technical Lead for Cloud Computing Co-Chair, Cloud Security WG Co-Chair, Cloud Forensics Science WG March 26,
NIST SP 800-34, Revision 1 Contingency Planning Guide for Federal Information Systems
NIST SP 800-34, Revision 1 Contingency Planning Guide for Federal Information Systems Marianne Swanson NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Table Of Contents Introduction to NIST SP 800-34
Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013
Audit Report The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 A-14-13-13086 November 2013 MEMORANDUM Date: November 26,
Ohio Supercomputer Center
Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
FedRAMP Master Acronym List. Version 1.0
FedRAMP Master Acronym List Version 1.0 September 10, 2015 Revision History Date Version Page(s) Description Author Sept. 10, 2014 1.0 All Initial issue. FedRAMP PMO How to Contact Us For questions about
Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst
Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment
