IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
|
|
|
- Wilfred Gordon
- 10 years ago
- Views:
Transcription
1 IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT We combined ISO framework for IT Security Risk Management with NIST Multitier framework and we claim that IT Security Risk Management framework exist at each organizational levels. In this paper we concentrate on the monitoring and communication steps of IT Security Risk Management and especially escalation of new IT Security Incidents. We present a first draft to an IT Security Risk Escalation Capability Maturity Model based on ISACA s Risk IT Framework. Finally we will use our approach in a cloud computing environment as we believe that it is necessary to react fast on incident and therefore a need to have a welldocumented and communicated monitoring and escalation processes between different organizational levels. KEYWORDS Cloud Computing, IT Security Risk Management, Incident Escalation, Maturity Models, IT Security Risk Monitoring, IT Security Risk Communication 1 INTRODUCTION Cloud computing is fast growing and a majority of organization will use some form of cloud computing in the near future [1]. This make cloud computing critical as millions of users could be affected e.g. in cyber-attacks so the question to ask is: Do we need to have a new IT Security Risk Management framework for managing IT Security Risks at the speed of change? According to ISO27005 [2] IT Security Risk Management consists of three main steps: (i) IT Security Risk Assessment, (ii) IT Security Risk Monitoring, and (iii) IT Security Risk Communication. During the different eras in history of computing, from mainframe to cloud computing, IT Security Risk Assessment has almost remained the same and a number of different tools have been developed during the years [3]. The most important purpose of IT Security Risk Assessment is to determine the acceptable risk level of the organization and, if necessary, install new countermeasures to reach that level. The main step that has change is primarily IT Security Risk Monitoring as it is necessary to react fast on new threats and incidents. This means that also the third main step, IT Security Risk Communication between different organizational levels, also need to be changed so Organizations have a welldocumented and communicated monitoring and escalation processes. This is especially important in a cloud computing environment where resources are shared between other cloud customers and can be rapidly changed [4]. The purpose of this paper is to propose a model for IT Security Risk Management for cloud computing where the focus is on IT Security Risk Communication and to some extent IT Security Risk Monitoring. The paper is divided into 4 sections. In the ISBN: SDIWC 56
2 first section we present ISO27005 and other framework. In the second section we present our approach. In the third section we discuss how our approach could be used for Cloud Computing. In the last section we conclude the paper with suggestions for future research. 2 BACKGROUND 2.1 IT Security Risk We use the term IT Security Risk to distinguish it from other Business Risk like investment risk, credit risk, market risk etc. NIST Special Publication page 8 [5] has the following definition: Risk is a function of the likelihood of a given threatsource s exercising a particular potential vulnerability and the resulting impact of that adverse event on the organization. IT Security Risks are then: Adverse Event on the Information Technology Systems of an Organization. There are basically two ways to calculate risk; Quantified or Qualified approaches. The quantitative approach uses the expected number of adverse events per year and the average cost for the occurrence of one event. The qualitative approach, on the other hand, use a scale with (e.g.) three values; low, medium or high. This scale is used for expressing both the expected number of events and the cost for one occurrence. All organisations today have some kind of information system (IS) based on information Technology (IT). Organizations are exposed of different threats both inside and outside the organization. These threats can be avoided with help of countermeasure of different kind. However it is difficult to justify spending effort on countermeasures for an IT-system that have little business impact for the organisation. To find the right mix of countermeasures a number of IT Security Risk Management methods and tools have been developed to assist the organization. ISO is an international standard that describe how IT Security Risk Management should be performed. 2.2 IT Security Risk Management The term IT Risk Management refers to approaches and methods that lead to cost effective security solutions and countermeasures ISO27005 [2]. This is done by a process of measuring the security risk to IT systems and assuring adequate levels of protection. IT Security Risk Management is a continuous process and consists of the following steps listed below and outlined in figure 1. Risk Assessment that consists of Risk Analysis and Risk Evaluation. Risk Analysis that consists of Risk Identification and Risk Estimation. Risk Identification where identification of assets, threats, existing countermeasures, vulnerabilities and consequences (impacts) is made. Risk Estimation where impacts of threats to different assets are calculated using the quantitative or qualitative approach. Risk Evaluation where different risks are compared against risk levels based on risk evaluation and risk acceptance criteria. Risk Treatment where, if necessary, new countermeasures are installed. Risk Acceptance where residual risks to different assets are stated. ISBN: SDIWC 57
3 Risk Communication where the risks are communicated to the organization. Risk Monitoring and Review where a continuous monitoring of risk is done. look at the organization from different views. Figure 1: ISO [2]. The result of risk assessment and risk treatment is an IT security risk model that represents how an organization handles threats to information assets with help of countermeasures of different kind. In the rest of the paper we will discuss some important issues how risk communication and risk monitoring could be done in organizations. 2.3 NIST Multitier Organization-Wide Risk Management Organization can be modeled to have three different levels where IT Security Risk Management decisions are made: (i) Top management, (ii) Middle management, and (iii) Operational Staff. The decision of top management is often of strategic nature while middle management is of tactical nature. Staff on the other hand had to deal with real IT security risk incidents and often had to react directly. According to NIST [6] an organization normally has three different levels (Tiers) where one can Figure 2: NIST Multitier Organization-Wide Risk Management. On the first Tier we look at risks from an organizational perspective. Risk management activities at Tier 1 directly affect activities on the other tiers by implementing governance structure that is consistent with the strategic goals of the organization. Governance includes such thing as determination of risk tolerance. Risk tolerance is the level of risk that is acceptable to the organization. Risk tolerance is often influence by the culture of the organization. Tier 2 view risk from a mission/business processes perspective by designing and implementing processes that support business functions defined at Tier one. Important issues at Tier 2 are enterprise architecture where information security architecture is integral part. Another issue is risk response strategies, which could be; accept, avoid, mitigate, share, and transfer. Information system perspective at Tier 3 is guided by the risk decisions and activities at Tier 1 and 2. Risk management activities at Tier 3 are also integrated into the system development life cycle. At Tier 3 riskbased decisions are made regarding the implementation, operation and monitoring of organizational information system. ISBN: SDIWC 58
4 2.4 Cloud Computing Benefits Cloud computing is not a new technology but a new way of delivering computing resources [7]. Cloud providers are offering on-demand computing services which could reduce IT cost and increase capabilities for cloud customers. According to European Network and Information Security Agency (ENISA) [7] some of the top benefits are: Cloud resources like storage, CPU time, memory, can be rapidly scaled to respond to sudden peaks in demand. Security and the benefits of scale which means that cloud-based countermeasures, when implemented on a large scale, can be more robust and cost-effective compared to inhouse computing. Cloud provider can also afford to hire security specialist dealing with specific security threats and have the economic resources to use multiple locations. Massive concentration of resources and data is a danger as it could attract attackers but there are also some benefits with resource concentration. It is easier and cheaper for cloud providers to control such things as patch management, incident management, and maintenance processes etc. 2.5 Cloud Computing Risks However there are also some risks. D Vohradsky [9] has made a ranking comparison of top risks identified by different organizations like Cloud Security Alliance (SCA), Open Web Application Security Project (OWASP), and European Network and Information Security Agency (ENISA). Some of the most important top security risks are: Loss of governance as it is necessarily to leave some controls to the cloud provider on issues which may affect security. Service Level Agreement (SLA) for example may prohibit the cloud customers to use some controls like penetration testing thus leaving a gap in the cloud customers security defenses. Lock-in varies according to the cloud service models (SaaS, etc.) but in all case means that it is difficult for a cloud customer to mitigate to another cloud provider or back to an in-house IT environment. Isolation failures like failure to separating storage, memory, etc. between different cloud customers and insecure or incomplete data deletion. Compliance risks meaning problems for cloud customers in achieving certification e.g. to meet regulatory requirements. That could depend on the fact that the cloud provider cannot provide evidence of his own compliance or that the cloud provider does not permit audit by the cloud customers. Malicious insider at the cloud provider who could cause damages which is often far greater compared to in-house computing as it could affects a number of other cloud customers. 3 APPROACH 3.1 Combination of ISO and NIST framework First we combined the ISO and NIST framework. After the first initial IT Security Risk Assessment and Risk Treatment which act as a base for the organization we believe that IT Security Risk Management exists at each organizational level. The first initial Risk Assessment / Risk Treatment is a collaboration between Tier 2 which have the knowledge what impact different threat will have and Tier 3 which have ISBN: SDIWC 59
5 knowledge of different threats to the IT environment. The Risk Assessment / Risk Treatment are governed by Tier 1 perception of risk tolerance and the risk culture of the organization. that might affect risk tolerance. Example of communication from the top level to lower levels is policy document of different kind. An important aspect is the difference in authority, competence and responsibility on the different organizational levels. The different level use different terms and concepts depending on their authority, IT competence and responsibility. The top management has for example high authority but sometimes lack the IT competence and language to communicate with individuals in IT operations. 3.2 IT Security Risk Monitoring Figure 3: Combination of ISO and NIST framework. The framework for each organizational level all consist of the three basic steps. IT Security Risk Monitoring of a new incident. Evaluate the new incident with IT Security Risk Assessment of some kind. In some cases mitigate the new risk (IT Security Risk Treatment) with help of new countermeasures or in some cases just accept the new risk. Use IT Security Risk Communication of the new risk to other organizational levels if necessary. Operational level (Tier three) handles a lot of incidents. Examples are surveillance of IT systems, servers, and networks. Other examples are end users error reports etc. Incidents at next level, Middle Management level (Tier two), are such thing that could influence the business processes that Middle Management is responsible for. At Top Management level (Tier one) incident that concern the core mission of the organization and incident To maintain an acceptable IT security risk level IT Security Risk Monitoring need to be an ongoing process. NIST Special Publication page vi [10] define Information Security Continuous Monitoring (CM) as maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. According to NIST Interagency Report 7756 [11], the data sources for CM include people, process, technology, and environment. Many CM implementations focus on technology as it is easy to automate data collection. The people, process, and environment data sources could not always have fully automated data collection and will in most cases require some human data collection effort. A number of Data Collection methods can be used to collect data. Examples are Surveys, Standards Based Methods and Tools, as well as Sensors of different kind. The methods could be both automated and manual. Data collection could be truly ISBN: SDIWC 60
6 continual (always on) or continuous (collected periodically at some set interval). Figure 5 describe combination of data sources and data collection methods. and involves at least two points, the measure and the reference. There is some difference between monitoring and metrics but both serve the same purpose of providing information. In this paper we use monitoring as simply paying attention to the information supplied by metrics. Figure 4: IT Security Risk Monitoring. The frequency of risk monitoring (automated or manual) depends among other things changes in organizations information system, the potential impact of risks and the degree the threat space is changing. The frequency could also be affected if automated or manual monitoring is used. By using automation it is possible to monitor a greater number of security metrics although it is not possible to fully automate all metrics, some metrics still need human analysis. NIST [10] describe eleven security automation domains that support continuous monitoring. Examples of such domain are Vulnerability management, Assets management, Network management, Information management, Configuration management, and Event management. 3.3 IT Security Metrics IT Security Risk Monitoring use Security Metrics of different kind. According to Brotby [12] metrics is a term used to indicate a measure based on a reference Figure 5: Handling of incident with help of security metrics. Security metrics can be categorized by what they measure like Performance, Outcomes, Trends, and Probabilities. How these things are measured can be further categorized by the methods used to measure them. Methods can include Maturity, Benchmarking, and Statistical analysis. Security metrics may also be classified according to how they are measured for example Quality, Throughput, Frequency, and Magnitude. Brotby [12] propose a taxonomy that defines 10 fundamental characteristics of metrics, including the following categories: Objective/Subjective Quantitative/Qualitative Static/Dynamic Absolute/Relative Direct/Indirect Some of the questions one need to ask when handling possible incident are: Is it actually an incident? ISBN: SDIWC 61
7 Is it a security incident? Are there multiple events and impacts? What immediate actions must be taken? Who must be notified? Is it becoming a disaster? Incidents are often handled by a Help Desk which may filter incidents before some incidents are sent to The First Responder who performs the preliminary analysis. In some cases senior technical resources are assigned to resolve an incident. 3.4 IT Security Risk Escalation When handling incidents of different kind, each level has to consider if the incident would harm the acceptable risk level of the organization. Each level has basically three alternatives; you can accept the risk, you can try to mitigate the risk (risk treatment), or you can escalate the risk to the organizational level above. Reasons to escalate could for example be budgetary considerations to implement new countermeasures, or that the incident is so serious that help from a higher level is needed. One alternative for Top Management is to externalize the IT risk using insurance. Figure 6: IT Security Risk Escalation. An incident is an event that has a human root cause. All incidents are events but many events are not incidents. However in this paper we will consistently make use of the term incident. An incident is an observable change to the normal behavior of a system. A normal incident does not affect critical components and to not require participation of senior personnel. An escalated incident on the other hand affects critical production system and normally need participation of senior personnel. An emergency incident needs to be handle by an Emergency Response team. Escalation process can either be Technical or Management. 3.5 IT Security Risk Escalation Maturity Model According to Philips page 3 [13] a Capability Maturity Mode is a model for judging the maturity of the processes of an organization and for identifying the key practices that are required to increase the maturity of these processes. We present a first draft to an IT Security Risk Escalation Capability Maturity Model. We will use ISACA s Risk IT Framework [14] as a starting point when we defined our model and will use the following maturity levels: 0. Non-existent when processes are not applied at all. 1. Initial when processes are performed ad hoc and disorganized. 2. Repeatable when processes follow a regular pattern. 3. Defined when processes are documented and communicated 4. Managed when processes are monitored and measured. 5. Optimized good practices are followed and automated. Our model is built around the following attributes: Awareness and communication. Responsibility and accountability. ISBN: SDIWC 62
8 Goal setting and measurement. Policies, standards and procedures. Skills and expertise. Tools and automation. Escalation can be of both technical and management type which will affect some of the attributes as both need be fulfilled to reach the maturity level. Our maturity model is presented in Appendix (Table 2 and 3). The maturity model could be used to identify both where the organization is today and as a target for improvement. In the next section we will use our approach in a cloud computing environment to identify the minimum maturity level and which attributes that are most important. 4 THE NEW APPROACH APPLIED TO CLOUD COMPUTING 4.1 Characteristics of Cloud Computing According to NIST [15] cloud computing is composed of five essential characteristics, three service models, and four deployment models. Essential characteristics of cloud computing are: On-demand self-service. A cloud customer can when needed automatically use computing capabilities, like server time and network storage without requiring human interaction by the service provider. Broad network access. Computer resources are available over the network and accessed through standard mechanisms like mobile phones, tablets, laptops, and workstations. Resource pooling. The provider s computing resources (e.g. storage, processing, memory, and network bandwidth) are dynamically assigned and reassigned according to consumer demand. The customer generally has no control or knowledge over the exact location of the provided resources. Rapid elasticity. Cloud customers can scale up and down the usage of computer resources in some cases automatically when required and can be purchased in any quantity at any time. Measured service. Cloud resource usage (e.g., storage, processing, bandwidth, and active user accounts) can be monitored, controlled, and reported. Both the cloud provider and customer can use information of the utilized service. 4.2 Cloud Computing Service Models Three different kinds of Service Models are used: Software as a Service (SaaS) meaning that the cloud provider delivers software application as a service (like web-based mail) to the cloud customer. The cloud customers do not need to invest in software license and servers and the cloud providers are able to use the economics of scale as the service can be used by a number of different cloud customers. Platform as a Service (PaaS) meaning that the cloud provider delivers service that the cloud customer could use to build own application like. Infrastructure as a Service (IaaS) meaning that the cloud provider delivers processing, storage, networks, and other fundamental computing resources to the cloud customers who can use this to deploy and run own developed or bought software. 4.3 Cloud Computing Deployment Models There are also different Deployment Models for the cloud infrastructure: ISBN: SDIWC 63
9 Private cloud. The cloud infrastructure is used by a single organization that consists of multiple customers (e.g., business units). Private cloud may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises. The advantages are among other things complete control of data. The main disadvantages are huge investment and maintenance costs. Community cloud. The cloud infrastructure is used by a specific community of customers from organizations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations). Community cloud may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises. The advantages are among other things better control of data. The main disadvantages are investment and maintenance costs. Public cloud. The cloud infrastructure is used by the general public. Public cloud may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider. The main advantages are that services could be used by pay-per-usage schemes and no initial investments for hardware and software are needed. Disadvantages are among other things the risk of not having complete control of data. Hybrid cloud. The cloud infrastructure is a mixture of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability. The advantages are that hybrid clouds are more flexible than both public and private clouds but the disadvantage is to determine what services that should be used for public and/or private clouds. Figure 7: The NIST Cloud Visual Models [16]. 4.4 Cloud Computing and Traditional Outsourcing There is some difference between cloud computing and traditional outsourcing. According to Annamalai [16] the advantages are lower investment in hardware infrastructure and lower operating cost. Elasticity and scalability could be done on demand and quick procurement of services is easy. The disadvantages are poorer legal and data proximity compliance and the cloud customers do not hold entire control of data. There are also some differences in the degree of control an organization have when using Cloud Computing, Traditional Outsourcing, or In-House Computing which is illustrated in the figure below. Figure 8: Degree of control. ISBN: SDIWC 64
10 However the degree of control also differs depending of what kind of deployment model that are used. For example using a private cloud could in some sense be compared to In-House Computing. Table 1: Degree of control and Deployment Model 4.5 Monitoring in a Cloud Computing Environment Characteristics of cloud computing (and other third party services) are that most of the monitoring needs to be done by the cloud provider but it still up to the organization to judge the risk. Figure 9: Handling of incident in Cloud Computing Cloud services offered by the cloud provider are defined in a service level agreement (SLA). Example of important questions to be asked concerning monitoring according to ENISA [4] are: Service availability. Which functions should be covered by availability monitoring? How to define when a system is unavailable and how availability is measured (e.g. by user reports, sample requests etc.)? Incident response. What is the definition of minimum response times and what kind of severity classification of different incidents exist? What incident management capabilities are in place? Service elasticity and load tolerance. For which resources should elasticity be monitored and what kind of elasticity tests (e.g. burst tests) should be used? Data life-cycle management. What kind of back-up operations will be used and in what way are back-ups tested? Technical compliance and vulnerability management. How are technical compliance defined? What kind of software updates and handling of patches will be applied? What are the procedures for vulnerability discovery and reporting? Change management. How is change management defined? What will happen if critical changes to system configuration take place if this for example will result in loss of certification status (e.g. ISO)? Data isolation. How are data isolation tested when data exist memory or at rest? How is secure deletion done? Could data isolation be tested independently? Log management and forensics. How are log management and forensics defined? What metrics are in place? Are logs tested frequently for availability? 4.6 Escalation Maturity Model applied to Cloud Computing Compared to traditional outsourcing cloud computing are even more complex as resources are shared between customers and can be rapidly changed. This means that incident reporting in a fast way are even more important and ccommunication ISBN: SDIWC 65
11 between organizational levels must work probably, especially escalation routines. In this part we will use the escalation maturity model to point out which parameters that is most important in a cloud computing environment. Of course, all organizations should strive to reach the highest maturity level. However in a cloud computing environment where most monitoring result are delivered by the cloud provider the minimum escalation maturity level for an organization should at least be the third level (Defined). The most important attributes are: Responsibilities and Accountability. Policies, Standards, and Procedures. 5 CONCLUSIONS AND FUTURE RESEARH There are profits to be found in the cloud and there is no need to reinvent the wheel for risk management but there is a needed to review and develop risk communication (escalation) and risk monitoring process at all levels in the organization when moving into the cloud. One contribution of our work is that IT Security Risk Management can be better adapted to the current situation. The maturity escalation model could for example be used by organizations to understand where shortcomings exist and act as a goal for where they should be. We will use the same methods as Karokola [17] so the next step is a desktop analysis of our approach on different organizations using various scenarios. For each organization a number of people representing the different organizational levels (strategic, tactical, and operational) will be asked for their ratings of some dimensions. A scale with percentage will be used. Examples of dimensions are: Simplicity Coverage and completeness Flexibility Relevance Usefulness 6 REFERENCES 1. ENISA: Critical Cloud Computing, European Network and Information Security Agency (2012). 2. ISO/IEC : Information security risk management (2008). 3. ENISA, Inventory of Risk Management / Risk Assessment Methods and Tools, European Network and Information Security Agency, (2005). 4. ENISA: Procure Secure: A guide to monitoring of security service levels in cloud contracts, European Network and Information Security Agency (2012). 5. NIST Special Publication : Risk Management Guide for Information Technology Systems, National Institute of Standard and Technology U.S. Department of Commerce, (2002). 6. NIST Special Publication : Guide for Applying Risk Management Framework to Federal Information Systems, National Institute of Standard and Technology U.S. Department of Commerce, (2010). 7. ENISA: Cloud Computing: Benefits, risk and recommendation, European Network and Information Security Agency (2009). 8. NIST Special Publication : Cloud Computing Synopsis and Recommendations, National Institute of Standard and Technology U.S. Department of Commerce, (2012). 9. Vohradsky, D.: Cloud Risk 10 Principles and a Framework for Assessment, ISACA Journal volume 5 (2012). 10. NIST Special Publication : Information Security Continuous Monitoring (ISCM) for Federal Information System and Organizations, National Institute of Standards and Technology U.S. Department of Commerce, (2011). 11. NIST Interagency Report 7756: CAESARS Framework Extension: An Enterprise Continuous Monitoring Reference Model (Second Draft), National Institute of Standard and Technology U.S. Department of Commerce, (2012). 12. Brotby, W. K.: Information Security Management Metrics: A Definitive Guide to ISBN: SDIWC 66
12 Effective Security Monitoring and Measurement, Taylor & Francis, (2009). 13. Philips, M.: Using a Capability Maturity Model to Derive Security Requirements, SANS Institute, (2003). 14. ISACA: The Risk IT Framework, (2009). 15. NIST Special Publication : The NIST Definition of Cloud Computing, National Institute of Standard and Technology U.S. Department of Commerce, (2011). 16. Annamalai, N.: Information Security Guidelines for Organizations intending to adopt Cloudsourcing (Master Thesis), Department of Computer and System Sciences University of Stockholm and Royal Institute of Technology, Sweden, (2012). 17. Karokola, G.: A Framework for Securing e- Government Services (PhD Thesis), Department of Computer and System Sciences Stockholm University, Sweden, (2012). ISBN: SDIWC 67
13 APPENDIX: IT Security Risk Escalation Capability Maturity Model Table 2: IT Security Risk Escalation Capability Maturity Model part 1 Table 3: IT Security Risk Escalation Capability Maturity Model part 2 ISBN: SDIWC 68
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
Kent State University s Cloud Strategy
Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes
Cloud Computing Supplementary slides Course: Designing and Implementing Service Oriented Business Processes 1 Introduction Cloud computing represents a new way, in some cases a more cost effective way,
6 Cloud computing overview
6 Cloud computing overview 6.1 General ISO/IEC 17788:2014 (E) Cloud Computing Overview Page 1 of 6 Cloud computing is a paradigm for enabling network access to a scalable and elastic pool of shareable
See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.
Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,
Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
IS PRIVATE CLOUD A UNICORN?
IS PRIVATE CLOUD A UNICORN? With all of the discussion, adoption, and expansion of cloud offerings there is a constant debate that continues to rear its head: Public vs. Private or more bluntly Is there
Technology & Business Overview of Cloud Computing
Your Place or Mine? In-House e-discovery Platform vs. Software as a Service Technology & Business Overview of Cloud Computing Janine Anthony Bowen, Esq. Jack Attorneys & Advisors www.jack-law.com Atlanta,
AskAvanade: Answering the Burning Questions around Cloud Computing
AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
The NIST Definition of Cloud Computing
Special Publication 800-145 The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication 800-145 The NIST
The NIST Definition of Cloud Computing (Draft)
Special Publication 800-145 (Draft) The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication
OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect
OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud
IT Audit in the Cloud
IT Audit in the Cloud Pavlina Ivanova, CISM ISACA-Sofia Chapter Content: o 1. Introduction o 2. Cloud Computing o 3. IT Audit in the Cloud o 4. Residual Risks o Used Resources o Questions 1. ISACA Trust
Cloud Security Specialist Certification Self-Study Kit Bundle
Cloud Security Specialist Certification Bundle CloudSchool.com CLOUD CERTIFIED Technology Professional This certification bundle provides you with the self-study materials you need to prepare for the exams
Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable
ITSM in the Cloud. An Overview of Why IT Service Management is Critical to The Cloud. Presented By: Rick Leopoldi RL Information Consulting LLC
ITSM in the Cloud An Overview of Why IT Service Management is Critical to The Cloud Presented By: Rick Leopoldi RL Information Consulting LLC What s Driving the Move to Cloud Computing Greater than 70%
IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY
IG MATURITY MODEL FOR FY 2015 FISMA 1 Ad-hoc 1.1 program is not formalized and activities are performed in a reactive manner resulting in an adhoc program that does not meet 2 requirements for a defined
CHOOSING THE RIGHT CLOUD COMPUTING SOLUTION FOR YOU
CHOOSING THE RIGHT CLOUD COMPUTING SOLUTION FOR YOU ABSTRACT Dan Smedescu This article provides an introduction to cloud computing and choosing a vendor. The first part includes definitions and service
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?
East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management
Information Technology Risk Management
Find What Matters Information Technology Risk Management Control What Counts The Cyber-Security Discussion Series for Federal Government security experts... by Carson Associates your bridge to better IT
Certified Information Security Manager (CISM)
Certified Information Security Manager (CISM) Course Introduction Course Introduction Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Information Security
The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.
The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Capability Paper. Today, aerospace and defense (A&D) companies find
Today, aerospace and defense (A&D) companies find Today, aerospace and defense (A&D) companies find themselves at potentially perplexing crossroads. On one hand, shrinking defense budgets, an increasingly
SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE
SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE H.Madhusudhana Rao* Md. Rahmathulla** Dr. B Rambhupal Reddy*** Abstract: This paper targets on the productivity of cloud computing technology in healthcare
1. From the CIO 3. 2. Strategic Direction for Cloud Computing at Kent State 4. 3. Cloud Computing at Kent State University 5
Kent State University ss Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology
The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government
The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government October 4, 2009 Prepared By: Robert Woolley and David Fletcher Introduction Provisioning Information Technology (IT) services to enterprises
Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs)
Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs) Robert Bohn, PhD Advanced Network Technologies Division Cloud FS Americas 2015 New York,
Achieve Economic Synergies by Managing Your Human Capital In The Cloud
Achieve Economic Synergies by Managing Your Human Capital In The Cloud By Orblogic, March 12, 2014 KEY POINTS TO CONSIDER C LOUD S OLUTIONS A RE P RACTICAL AND E ASY TO I MPLEMENT Time to market and rapid
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014
Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September What is the The Cloud Some Definitions The NIST Definition of Cloud computing Cloud computing is
Cloud Services Overview
Cloud Services Overview John Hankins Global Offering Executive Ricoh Production Print Solutions May 23, 2012 Cloud Services Agenda Definitions Types of Clouds The Role of Virtualization Cloud Architecture
Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto
Cloud Computing: What needs to Be Validated and Qualified Ivan Soto Learning Objectives At the end of this session we will have covered: Technical Overview of the Cloud Risk Factors Cloud Security & Data
Guardian365. Managed IT Support Services Suite
Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service
OVERVIEW Cloud Deployment Services
OVERVIEW Cloud Deployment Services Audience This document is intended for those involved in planning, defining, designing, and providing cloud services to consumers. The intended audience includes the
CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data
CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
AN OVERVIEW ABOUT CLOUD COMPUTING
International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 27-30 AN OVERVIEW ABOUT CLOUD COMPUTING R. Anandhi 1, and K. Chitra 2 ABSTRACT: This paper
Cloud Computing. Chapter 1 Introducing Cloud Computing
Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization
BUSINESS MANAGEMENT SUPPORT
BUSINESS MANAGEMENT SUPPORT Business disadvantages using cloud computing? Author: Maikel Mardjan [email protected] 2010 BM-Support.org Foundation. All rights reserved. EXECUTIVE SUMMARY Cloud computing
Cloud Computing. Chapter 1 Introducing Cloud Computing
Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization
Cloud Computing Security Issues
Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security, [email protected] Something Old, Something New New: Cloud describes the use of a collection of services, applications,
CLOUD COMPUTING. A Primer
CLOUD COMPUTING A Primer A Mix of Voices The incredible shrinking CIO CIO Magazine, 2004 IT Doesn t Matter, The cloud will ship service outside the institution and ship power from central IT groups to
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
CLOUD COMPUTING SECURITY ISSUES
CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights
How To Protect Your Cloud Computing Resources From Attack
Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director
Validating Enterprise Systems: A Practical Guide
Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise
Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region
Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region 1 1) Government Cloud Journey 2) Government Clouds 3) Way Forward 2 1. Government Cloud
Cloud Computing in a Regulated Environment
Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2
Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit [email protected]
Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit [email protected] 2 If cloud computing is so simple, then what s the big deal? What is the
Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter
Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute
Enhancing Operational Capacities and Capabilities through Cloud Technologies
Enhancing Operational Capacities and Capabilities through Cloud Technologies How freight forwarders and other logistics stakeholders can benefit from cloud-based solutions 2013 vcargo Cloud Pte Ltd All
The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -
45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART
State of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
Strategies for Secure Cloud Computing
WHITE PAPER Cloud Basics Strategies for Secure Cloud Computing An Introduction to Exploring the Cloud There is a lot of buzz these days about cloud computing and how it s going to revolutionize the way
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Awareness, Trust and Security to Shape Government Cloud Adoption
Awareness, Trust and Security to Shape Government Adoption Awareness Trust Security A white paper by: April 1 1 Executive Summary The awareness, trust and security issues that have limited federal government
20 th Year of Publication. A monthly publication from South Indian Bank. www.sib.co.in
To kindle interest in economic affairs... To empower the student community... Open YAccess www.sib.co.in [email protected] A monthly publication from South Indian Bank 20 th Year of Publication Experience
What Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
GAO INFORMATION SECURITY. Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing. Report to Congressional Requesters
GAO United States Government Accountability Office Report to Congressional Requesters May 2010 INFORMATION SECURITY Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing GAO-10-513
NetAid Services NETENRICH. Service at a Glance. IT as a Service Offering from NetEnrich. Delivering IT as a Service
Service at a Glance The NetAid service focus goes beyond mere monitoring of network infrastructure to preventative maintenance and proactive intervention. This could be a solution for IT managers who want
Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India [email protected]
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE
END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing
Planning the Migration of Enterprise Applications to the Cloud
Planning the Migration of Enterprise Applications to the Cloud A Guide to Your Migration Options: Private and Public Clouds, Application Evaluation Criteria, and Application Migration Best Practices Introduction
Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
GETTING THE MOST FROM THE CLOUD. A White Paper presented by
GETTING THE MOST FROM THE CLOUD A White Paper presented by Why Move to the Cloud? CLOUD COMPUTING the latest evolution of IT services delivery is a scenario under which common business applications are
CISM ITEM DEVELOPMENT GUIDE
CISM ITEM DEVELOPMENT GUIDE Updated January 2015 TABLE OF CONTENTS Content Page Purpose of the CISM Item Development Guide 3 CISM Exam Structure 3 Writing Quality Items 3 Multiple-Choice Items 4 Steps
ISMS Implementation Guide
atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation
The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing
Your Platform of Choice The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing Mark Cravotta EVP Sales and Service SingleHop LLC Talk About Confusing? Where do I start?
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
VMware vcloud Powered Services
SOLUTION OVERVIEW VMware vcloud Powered Services VMware-Compatible Clouds for a Broad Array of Business Needs Caught between shrinking resources and growing business needs, organizations are looking to
Cloud Computing Thunder and Lightning on Your Horizon?
Cloud Computing Thunder and Lightning on Your Horizon? Overview As organizations automate more and more of their manual processes, the Internet is increasingly becoming an important tool in the delivery
Cloud Computing: Background, Risks and Audit Recommendations
Cloud Computing: Background, Risks and Audit Recommendations October 30, 2014 Table of Contents Cloud Computing: Overview 3 Multiple Models of Cloud Computing 11 Deployment Models 16 Considerations For
Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services
Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization providing innovative management and technology-based
A Study on Service Oriented Network Virtualization convergence of Cloud Computing
A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute
