Cloud Security Introduction and Overview



Similar documents
See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.


Managing Cloud Computing Risk

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes

Cloud Security Alliance New Zealand Contribution to the Privacy Commissioner. 23 February 2012

IS PRIVATE CLOUD A UNICORN?

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

The NIST Definition of Cloud Computing

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

Security Issues in Cloud Computing

CLOUD COMPUTING GUIDELINES FOR LAWYERS

Capability Paper. Today, aerospace and defense (A&D) companies find

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Cloud Computing Governance & Security. Security Risks in the Cloud

6 Cloud computing overview

AskAvanade: Answering the Burning Questions around Cloud Computing

Enhancing Operational Capacities and Capabilities through Cloud Technologies

PRIVATE CLOUD PLATFORM OPTIONS. Stephen Lee CEO, ArkiTechs Inc.

What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era ( ) Workstation Era ( ) Xerox Star 1981!

Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs)

Kent State University s Cloud Strategy

The NIST Definition of Cloud Computing (Draft)

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1

Managing your Information Assets in the Cloud

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Data Security In The Cloud

White Paper on CLOUD COMPUTING

Cloud Security and Managing Use Risks

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

ITSM in the Cloud. An Overview of Why IT Service Management is Critical to The Cloud. Presented By: Rick Leopoldi RL Information Consulting LLC

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Cloud Computing: Risks and Auditing

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken )

REQUEST FOR INFORMATION FLORIDA AGENCY FOR STATE TECHNOLOGY CLOUD SERVICES AND SOLUTIONS RFI NO.:

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

How To Protect Your Cloud Computing Resources From Attack

Cloud Computing. What is Cloud Computing?

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Security. DLT Solutions LLC June #DLTCloud

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Is it Time to Trust the Cloud? Unpacking the Notorious Nine

Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB

Cloud computing is a marketing term for technologies that provide servers, outside of the firewall, for:

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

OVERVIEW Cloud Deployment Services

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

Business Intelligence (BI) Cloud. Prepared By: Pavan Inabathini

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE

A Secure System Development Framework for SaaS Applications in Cloud Computing

FACING SECURITY CHALLENGES

Orchestrating the New Paradigm Cloud Assurance

What Cloud computing means in real life

A HYPE-FREE STROLL THROUGH CLOUD STORAGE SECURITY

Cloud Computing: The Next Computing Paradigm

Cloud Computing Submitted By : Fahim Ilyas ( ) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

A white paper from Fordway on CLOUD COMPUTING. Why private cloud should be your first step on the cloud computing journey - and how to get there

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

CLOUD COMPUTING PHYSIOGNOMIES A 1.1 CLOUD COMPUTING BENEFITS

The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government

Cloud Computing: Background, Risks and Audit Recommendations

CLOUD COMPUTING DEMYSTIFIED

Top 10 Cloud Risks That Will Keep You Awake at Night

Cloud Computing Guide & Handbook. SAI USA Madhav Panwar

Compliance and Cloud Computing

Cloud Services Overview

Cloud Computing Service and Legal Issues

William Saichek Professor, Computer Science & Information Systems Orange Coast College

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Technology & Business Overview of Cloud Computing

Cloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

Seeing Though the Clouds

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects

Securing the Cloud through Comprehensive Identity Management Solution

Federal Aviation Administration. efast. Cloud Computing Services. 25 October Federal Aviation Administration

Public Cloud Security: Surviving in a Hostile Multitenant Environment

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Enterprise Architecture Review Checklist

Transcription:

Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015

Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious Nine Concerns of the Cloud consumers Traditional Security versus Cloud Security The 14 Domains of Cloud Security Best Practices and Guidelines Some hints about Cloud Security Information and Data classification 2. Introduction to Cloud Security Alliance (CSA) CSA Global CSA Switzerland Chapter

Cloud evolution Which steps we need for Cloud Computing? 3 Dynamic provisioning (Pay as you go, scale up and down) Shared resources (common workload profiles, multi-tenant) Automation (Self service, flexible deployment) Standardisation (Increase operational efficiency) Virtualisation (optimizing the utilization) Consolidation (physical infrastructure) Preparatory steps Traditional IT

Cloud definition The 5 Cloud characteristics (NIST) I/II 4 Characteristic On-Demand Self-Service Broad Network Access Resource Pooling Description A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider. Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops and workstations) The provider s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Examples of resources include storage, processing, memory and network bandwidth.

Cloud definition The 5 Cloud characteristics (NIST) II/II 5 Characteristic Rapid Elasticity / Scalability Measured Service Description Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be appropriated in any quantity at any time. Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service

Cloud definition Deployment models (NIST) 6 > Clouds which serve a special purpose or which have special requirements (for example financial Clouds) > On Premise > Enterprise Data Center > Self managed > Off Premise > Provider Data Center > Provider managed > Private and Public Cloud interconnected > On Premise > Enterprise Data Center > Provider managed > Off Premise > Provider Data Center > Self- or provider managed

Cloud definition Service models (NIST) 7 Traditional IT IaaS PaaS SaaS

A movie says more than 1000 words 8

Overview over the Cloud consumers view 9 Source: KPMG Cloud Monitor 2014

Some information from a Cloud Security company 10 Source: Skyhigh Networks Cloud Adoption and Risk Report: Q4 2014

The Notorious Nine 11 Data Breaches Data Loss Shared Technology Issues Insufficient Due Diligence Account & Service Hijacking Insecure Interfaces and APIs Abuse of Cloud Services Malicious Insiders Denial of Service (DoS) Source: Cloud Security Alliance - The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013

Security concerns of the Cloud consumers 12 Missing trust to the Cloud Service Provider Loss of control and Know How Physical control over the data is lost Data access by unauthorized persons The classical security perimeter is lost The well known and reliable IT operation takes no longer place on premise Complex technologies vulnerabilities (strong virtualization) Economic espionage taking place Compromised encryption Lack of accountability, unclear responsibilities of the CSP's Questioning the reliability and transparency of the CSP's Secure integration into the own on premise IT can be difficult Secure interoperability with other cloud services is not given

Traditional Security vs. Cloud Security I/II 13 Adaption of the Security organization and processes How to extend the CSIRT to the Cloud? Monitoring security incidents How to do forensics in the Cloud? Which external and internal Governance and Compliance aspects must be taken into account (for example PCI/DSS in the Cloud)? Cloud Usage Policy Outsourcing Policy The safe operation of the IT platform is no longer on premise Loss of control and know how (IT operation, problem analysis) Loss of important operating and monitoring data (for example Firewall-, IPS- and Proxy Server logs) Loss of Data retention and Data deletion control

Traditional Security vs. Cloud Security II/II 14 The Cloud consumer may be subject to international law, for example Data Privacy Law (look at the Federal Data Protection and Information Commissioner states list) Business Books Regulation in Switzerland Patriot Act / Foreign Intelligence and Surveillance Act (FISA) Ensuring Information Security at high virtualization- and automation degrees (Server-, Network, Client-, Storage-, Application-Virtualisation) Access Control Tenant isolation in a Cloud platform Which additional standards must be met (ISO 27018 PII protection in the Cloud, ISAE 3402 - Effectiveness of the internal Control Systems, ISO 37500 Guideline Outsourcing, ISO 27017 Cloud Security etc.)?

The 14 Cloud Security domains 15 Cloud Security D1: Secure Cloud Architecture Governing in the Cloud Operating in the Cloud > D2: Governance and Risk Management > D7: Traditional Security and BCM / DR > D3: Legal Issues Cloud Trust > Model D8: Data Center Operations > D4: Compliance and Audit Management > D9: Incident Response > D5: Information Mgmt and Data Security Trust > tod10: Application Security L3 > D6: Interoperability and Portability good encryption > D11: Encryption and Key Management > D12: Identity, Entitlement and Access Mgmt Trust to > the D13: Virtualisation L2 Cloud Service > Provider D14: Security as a Service L1 Trust to the Legal System Source: Cloud Security Alliance Security Guidance for Critical Areas of Cloud Computing

Best Practices and Guidelines 16

Implementation of Cloud Security Some hints (I/II) 17 Consideration of Best Practices (for example BSI, CSA, EuroCloud Swiss) Situational assessment of the Cloud risks (for example best on ENISA) Careful evaluation of a Cloud Service Provider (due diligence) Existing Security measures (physical and logical) Terms and Conditions (for example the SLA) Reputation Certifications (Standards etc.) Location / Country (-> to know the legal implications) Secure Cloud Architecture (technology and organisation)

Implementation of Cloud Security Some hints (II/II) 18 Seek law advice within your legal department Do Information- and Data classification Not all your data is ready and suitable for the Cloud! From the perspective of information and data protection From the perspective of availability and confidentiality Use Encryption End to End (Data on move, Data at rest, before leaving the workstation) Use the right encryption variant: regular, format preserving, searchable, order preserving, selective encryption Use Data Tokenization if possible According to the actual technical status, keep the keys in your hands!

Implementation of Cloud Security Data Classification Baseline for proper handling 19

Alliance (CSA) Introduction

Alliance What is the CSA 21 Worldwide not for profit organisation Headquarter in the USA (CSA Global) Worldwide distributed regional chapters (~70 chapters) Strong relationship in Europe (EU) with BSI in Germany and ENISA Some examples of the CSA Corporate members (~162):

Alliance Products 22 Source: Cloud Security Alliance

SecaaS Category 1 IAM in the Cloud 23 Content > Centralized Directory Services > Access Management Services > Identity Management Services > Identity Federation Services > Role Based Access Control > Privileged User Management > Segregation of duties > IAM Reporting Services Quelle: Cloud Security Alliance SecaaS Category 1

Switzerland Chapter 24 Introduction

Thanks for your attention!