Cloud Security Certification



Similar documents
Information Security ISO Standards. Feb 11, Glen Bruce Director, Enterprise Risk Security & Privacy

GRC Stack Research Sponsorship

TOOLS and BEST PRACTICES

The Cloud Security Alliance

Cloud Security Alliance and Standards. Jim Reavis Executive Director March 2012

A Flexible and Comprehensive Approach to a Cloud Compliance Program

Cloud Security Panel: Real World GRC Experiences. ISACA Atlanta s 2013 Annual Geek Week

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Open Certification Framework. Vision Statement

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Compliance and the Cloud: What You Can and What You Can t Outsource

Global Efforts to Secure Cloud Computing

Deploying Cloud Security Standards The MTCS Experience

Building an Effective

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Cloud Courses Description

Robert Brammer. Senior Advisor to the Internet2 CEO Internet2 NET+ Security Assessment Forum. 8 April 2014

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

Security and Privacy in Cloud Computing

Microsoft s Compliance Framework for Online Services

Logically Securing a Public Cloud Service

Cloud Courses Description

Amazon Web Services: Risk and Compliance January 2013

With Eversync s cloud data tiering, the customer can tier data protection as follows:

Cloud Audit and Cloud Trust Protocol. By David Lingenfelter 2011

Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors

In the Cloud We Trust!

Selecting a Cloud Service Provider (CSP)

Hans Bos Microsoft Nederland.

Cloud Services Overview

Cloud Security Benchmark: Top 10 Cloud Service Providers Appendix A E January 5, 2015

Anypoint Platform Cloud Security and Compliance. Whitepaper

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

How To Protect Your Cloud From Attack

Cloud Computing An Auditor s Perspective

Information Security Management System for Microsoft s Cloud Infrastructure

IT Audit in the Cloud

Protecting Data and Privacy in the Cloud

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Cloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak

Ensuring Cloud Security Using Cloud Control Matrix

Today s Speakers. A Conversation with Robbie Forkish, Forkish Consulting 9/1/2009. Webtorials Editorial/Analyst Division

Public Cloud Workshop Offerings

Appendix D-1 to Aproove Saas Contract : Security and solution hosting provider specs.

Cloud for Your Business

Assessing Risks in the Cloud

Cloud Computing What Auditors need to know

How to ensure control and security when moving to SaaS/cloud applications

Global Efforts to Secure Cloud Computing. Jason Witty President, Cloud Security Alliance Chicago

Securing the Microsoft Cloud

Cloud Computing An Internal Audit Perspective. Heather Paquette, Partner Tom Humbert, Manager

Amazon Web Services: Risk and Compliance July 2012

A view from the Cloud Security Alliance peephole

Cloud Security. DLT Solutions LLC June #DLTCloud

A Comparison of IT Governance & Control Frameworks in Cloud Computing. Jack D. Becker ITDS Department, UNT & Elana Bailey

Orchestrating the New Paradigm Cloud Assurance

Protec'ng Data and Privacy in a World of Clouds and Third Par'es Vincent Campitelli

Data Risk Management: ISM Ground to Cloud Summit. accelerate your ambition 1

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

TRUSTED CLOUD. Our commitment to provide a cloud you can trust. Fernando Machado Píriz September 2014

! Global Efforts to Secure! Cloud Computing

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

HIPAA and HITRUST - FAQ

Data, Data, Who Has The Data?

Cloud and Regulations: A match made in heaven, or the worst blind date ever?

Intermedia s Dedicated Exchange

Managing Cloud Computing Risk

Close-Up on Cloud Security Audit

INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

White Paper How Noah Mobile uses Microsoft Azure Core Services

SECURE CLOUD COMPUTING

Cloud Security & Risk. Adam Cravedi, CISA Senior IT Auditor acravedi@compassitc.com

Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Grid-Interop 2012

Working Group on. First Working Group Meeting

Agenda 4/21/2015. Evelyn de Souza Chair Cloud Security Alliance Data Governance Chair/ Data Privacy and Compliance Leader Cisco Systems

Building More Reliable Cloud Services The CUMULUS Project

Cloud Security Alliance: Industry Efforts to Secure Cloud Computing

Sikkerhet i skytjenester; hva bør en tenke på? Ole Tom Seierstad National Security Officer Microsoft Norway oles@microsoft.com

Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Microsoft Azure. Die "Hyper-Scale" Cloudplattform. Gerwald Oberleitner 22. September 2015

Cloud Computing Governance & Security. Security Risks in the Cloud

Auditing Cloud Computing. A Security and Privacy Guide. Wiley Corporate F&A

How To Build Trust In The Cloud

Cloud Computing Policy 1.0 INTRODUCTION 2.0 PURPOSE. Effective Date: July 28, 2015

Key Considerations of Regulatory Compliance in the Public Cloud

AHLA. JJ. Keeping Your Cloud Services Provider from Raining on Your Parade. Jean Hess Manager HORNE LLP Ridgeland, MS

Securing the Microsoft Cloud

Cloud certification guidelines and recommendations

Cloud Computing Security Issues

The Education Fellowship Finance Centralisation IT Security Strategy

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

Cloud Computing - Starting Points for Privacy and Transparency

How To Understand Cloud Computing

Securing Amazon It s a Jungle Out There

Visions of Clouds and Cloud Security. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

The silver lining: Getting value and mitigating risk in cloud computing

Cloud Computing in a Regulated Environment

SUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR

Transcription:

Cloud Security Certification January 21, 2015 1

Agenda 1. What problem are we solving? 2. Definitions (Attestation vs Certification) 3. Cloud Security Responsibilities and Risk Exposure 4. Who is responsible for cloud security? 5. Cloud Service Provider Certifications 6. CSA Open Certification Framework 7. Cumulus Project 8. Cloud Practitioner Certifications 9. Summary 2

What Problem are we Solving? 1. How do you know that the provider of your cloud services can be trusted with your..? 2. What are you basing this trust on? 3. What level of assurance do you need? 4. How can you compare the security services provided by one cloud service provider with another? 5. How can you compare the security features of cloud service providers? 6. What needs to be included in service agreements and contracts? 7. How can you demonstrate competency in cloud security? 3

Definitions Security Certification A statement by a recognized authority that a security evaluation has been undertaken competently and in accordance with appropriate regulations. The comprehensive assessment of the technical and non-technical security features and other safeguards of a system to establish the extent to which a particular system meets a set of specified security requirements for its use and environment. Security Accreditation Formal declaration by a Designated Approval Authority (DAA) that an information system is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk. Attestation The act of showing or evidence showing that something is true. Involves having a third party organization review the practices of the service provider and make a statement about the security posture of the organization. 4

Certification vs Attestation Certification Assessed against an externally governed framework and control standard. Assessed by a registrar from an accredited organization using a formal auditing standard Common framework and collection of controls Certification can be compared with other organizations Attestation Assessed against a framework and controls specific to the organization Could be self-assessed or by an independent/qualified third party From a service provider perspective, formal attestation reports such as a SOC 2 report may only be shared with existing customers. The assessment process is governed by standards but the object of the assessment is not. Attestations cannot be compared to other organizations. 5

Cloud security is a shared responsibility Shared between the enterprise and the cloud provider, with varying responsibilities depending on the nature of the (X)aaS type Private Cloud IaaS PaaS SaaS Governance, Risk & Compliance Data Security Application Security Platform Security Infrastructure Security Physical Security 6

Cloud Service Provider (CSP) Risk Exposure The nature of the CSP relationship determines the risk exposure 1. Risk Attributes Financial stability Geography Capability / capacity / service-levels Corporate strategy and leadership 2. Product / Service Profile Type of service / implementation Nature / extent of customer interaction Access to intellectual property Sensitivity to regulatory requirements 3. Level of Integration Integration into end products Emerging technologies, and alignment of technology and processes 4. Service Model affecting CSP Oversight Staff augmentation Managed service Potential Risk Exposures Strategic / CSP Selection Information Security Reputation Transaction / Operational Financial Legal / Compliance Credit Contractual Geopolitical Business Continuity 7

Cloud Certification Considerations Service Providers Ability to determine the level of security protection provided by the cloud service provider What are the legal implications? Assurance Levels Level of certification to match the required level of assurance in the provision of the cloud services What is the right level of assurance? Audit Requirements Obtain a 3 rd party opinion based on accepted standards and practices Speciality audits for service providers Professional Certifications Rely on the certified expertise of people involved in providing cloud services Obtain certifications to further a career 8

Cloud Service Provider Certifications 1. Cloud Security Alliance (CSA) Security, Trust and Assurance Registry (STAR) Leading cloud security certifications based on the Open Certification Framework 2. US FedRAMP - Secure Cloud Computing for Federal Government Cloud certification using a baseline of security controls to support low and moderate impact systems based NIST 800-53 V4 3. UK GCloud Assertion-based using implementation guidance in support of 14 cloud security principles 4. TRUSTed Cloud Privacy Certification Review of data privacy management practices. If practices are consistent with the TRUSTe Privacy Program Requirements will be granted the TRUSTe Certified Privacy Seal 5. Service Organizational Control (SOC) 2 compliance. SOC 2 certification is designed for a technology and cloud computing organizations. It provides the assurance that a service provider delivers secure, reliable and effective systems for information storage, com 9

Cloud Service Provider Certifications continued 6. ISO 27001 Certification Certification of the ISMS supporting the Cloud Services 7. ISO/IEC 20000-7: Application of ISO/IEC 20000-1 to the cloud. Currently being developed. To provide guidance on application of ISO/IEC 20000 Part 1 to the cloud. 8. Hybrid Certification (externally certified and audited) Service Organization Controls 1 (SOC 1) Type II report Service Organization Controls 2 (SOC 2) Type II report ISO 27001 certification PCI DSS Level 1 US Federal Risk and Authorization Management Program (FedRamp) Audits including; ITAR, FIPS 140-2, FISMA/DIACAP, HIPAA This approach is used by Amazon AWS, Rackspace and Microsoft Azure. 9. CUMULUS - Certification infrastructure for MUlti-Layer cloud Services EU-based project for development of certification models, processes and tools 10.Geography Specific Hong Kong/Guangdong cloud security assessment and certification scheme Multi-Tier Cloud Security Standard for Singapore (MTCS SS 584:2013) Trusted Cloud Service Certification China Cloud Computing Promotion and Policy Forum (CCCPPF) 10

CSA - Open Certification Framework Cloud Security Alliance (CSA) objective is to: Promote best practices for providing security assurance within Cloud Computing Inform consumers and providers on security issues Plays a role in addressing and implementing viable solutions for security challenges CSA will increase size and relevance as interest in implementing cloud solutions proliferate The Benefits of CSA Certification include: Broad acceptance of the controls used for security; A juried certification process using globally accepted criteria (ISO 27001); Alignment with a broad selection of frameworks and criteria; Transparent and available information to support certifications; and Certification levels that are appropriate for the assurance required by the cloud service requirements. 11

CSA - Open Certification Framework The STAR approach offers 3 different levels of certification that would align with different levels of required assurance. The 1 st level, CSA STAR Self- Assessment level, is obtained by registering the results of the Consensus Assessments Initiative Questionnaire (CAIQ) completed by the Cloud Service Provider. The 2 nd level can be CSA STAR Certification, obtained from an independent assessment from an accredited 3 rd party or CSA STAR Attestation, obtained from a conducted SOC 2 report using the AICPA Trust Service Criteria and the CSA CCM. The 3 rd level, CSA STAR Continuous Monitoring is under development. Certification is built upon the globally accepted standard for information security management systems (ISO 27001). 12

CSA Cloud Controls Matrix (CCM) The CCM is a code of practice focused on providing industry-accepted ways to document what security controls exist in IaaS, PaaS, and SaaS offerings CCM V3.0.1 Domains The CCM provides a broad foundation to satisfy cloud security requirements. The CCM defines 133 controls under 16 domains Each of the controls is cross-referenced with several other security frameworks including ISO 27001:2013, BITS, NIST 800-53 Revision 4, AICPA Trust Service Criteria and PCI DSS V2 & V3 among others. 13

CSA Cloud Control Matrix V3.0 Control Domain CCM V3.0 Control ID Updated Control Specification ISO/IEC 27001-2013 Application & Interface Security Application Security AIS-01 Applications and programming interfaces (APIs) shall be A9.4.2 designed, developed, deployed, and tested in accordance with A9.4.1, leading industry standards (e.g., OWASP for web applications) 8.1*Partial, A14.2.3, and adhere to applicable legal, statutory, or regulatory 8.1*partial, A.14.2.7 compliance obligations. A12.6.1, A18.2.2 Audit Assurance & Compliance Audit Planning Change Control & Configuration Management New Development / Acquisition Data Security & Information Lifecycle Management Classification AAC-01 Audit plans shall be developed and maintained to address business process disruptions. Auditing plans shall focus on reviewing the effectiveness of the implementation of security operations. All audit activities must be agreed upon prior to executing any audits. CCC-01 Policies and procedures shall be established, and supporting business processes and technical measures implemented, to ensure the development and/or acquisition of new data, physical or virtual applications, infrastructure network and systems components, or any corporate, operations and/or datacenter facilities have been pre-authorized by the organization's business leadership or other accountable business role or function. DSI-01 Data and objects containing data shall be assigned a classification by the data owner based on data type, value, sensitivity, and criticality to the organization. False Clauses 4.3(a), 4.3(b), 5.1(e), 5.1(f), 6.2(e), 9.1, 9.1(e), 9.2, 9.3(f), A12.7.1 A.14.1.1 A.12.5.1 A.14.3.1 A.9.4.5 8.1* (partial) A. 14.2.7 A.18.1.3 A.18.1.4 A.8.2.1 14

CSA Cloud Assessments Initiative Questionnaire (CAIQ) The CAIQ provides a tool that can be used to support the STAR selfassessment level of the Open Certification Framework It provides a set of questions a cloud consumer and cloud auditor may wish to ask of a cloud provider. It is a series of yes or no control assertion questions which can be tailored to suit each unique cloud customer s requirements. There are 295 questions are based on the CSA Cloud Controls Matrix (CCM) using the same control groups and color coding. The questions are cross-referenced with other frameworks such as AICPA Trust Service Criteria, ISO 27001:2013, BITS, PIPEDA, COBIT, FedRamp, NIST 800-53, PCI DSS among others. The results of the questionnaire are contained in the STAR registry 15

CSA Consensus Assessments Initiative Questionnaire V3.0.1 Control Group Application & Interface Security Application Security CGI D AIS- 01 AIS-01.1 AIS-01.2 CID Control Specification Consensus Assessment Questions Applications and programming interfaces Do you use industry standards (Build (APIs) shall be designed, developed, Security in Maturity Model [BSIMM] deployed and tested in accordance with benchmarks, Open Group ACS Trusted leading industry standards (e.g., OWASP for Technology Provider Framework, NIST, web applications) and adhere to applicable etc.) to build in security for your Systems/ legal, statutory, or regulatory compliance Software Development Lifecycle (SDLC)? obligations. Do you use an automated source code analysis tool to detect security defects in code prior to production? CCM v3.0.1 Compliance Mapping ISO/IEC 27001:2013 A9.4.2 A9.4.1, 8.1*Partial, A14.2.3, 8.1*partial, A. 14.2.7 A12.6.1, A18.2.2 AIS-01.3 AIS-01.4 AIS-01.5 Audit AAC- AAC-01.1 Assurance & 01 Compliance Audit Planning Audit plans shall be developed and maintained to address business process disruptions. Auditing plans shall focus on reviewing the effectiveness of the implementation of security operations. All audit activities must be agreed upon prior to executing any audits. Do you use manual source-code analysis to detect security defects in code prior to production? Do you verify that all of your software suppliers adhere to industry standards for Systems/Software Development Lifecycle (SDLC) security? (SaaS only) Do you review your applications for security vulnerabilities and address any issues prior to deployment to production? Do you produce audit assertions using a structured, industry accepted format (e.g., CloudAudit/A6 URI Ontology, CloudTrust, SCAP/CYBEX, GRC XML, ISACA's Cloud Computing Management Audit/Assurance Program, etc.)? Clauses 4.3(a), 4.3(b), 5.1(e), 5.1(f), 6.2(e), 9.1, 9.1(e), 9.2, 9.3(f), A12.7.1 16

CSA STAR Certification A STAR certification certificate cannot be issued unless the organization has passed their ISO 27001 assessment. The CSA maintains a registry of organizations that have completed one or more of the certification levels of the STAR certification framework. The STAR registry contains the information used for the CSA Open Certification Framework certifications. The self-assessment level will include the CSAQ self-assessment results The certification level includes the STAR certification registry entry and may include the STAR certificate if. The attestation level includes the attestation from the 3 rd party assessment organization. 17

Requirements for Bodies providing CSA STAR Certification A certification body conducting a CCM assessment must comply with ISO 27006. Accreditation is governed by ISO 27006:2011 Requirements for bodies providing audit and certification for information security management systems (the same standard for accrediting bodies for ISO 27001 certification). Assessors need to pass an accredited Lead Auditor Course for ISO 27001 or be a qualified and experienced ISO 27001 assessor for an International Accreditation Forum (IAF) member accredited ISO 27001 certification body. All assessors must have complete a BSI/CSA CCM exam. The scope of the ISO 27001 certification must not be less than the scope of the STAR certification. The assessment cycle is the same as ISO 27001 initial assessment followed by surveillance audits over a 3-year period. 18

Cumulus Certification infrastructure for MUlti-Layer cloud Services The Cumulus project is a research project initiated by 8 partners from European science and industry to investigate how future cloud services can be made more secure and trustworthy. The problems that the Cumulus project is addressing: There is difficulty to guarantee security properties of the different types of services available through clouds. Service providers are reluctant to take full responsibility of the security of their services once the services are uploaded and offered through a cloud. Cloud suppliers have historically refrained from accepting liability for a security leak. The provision and security of a cloud service is sensitive to changes due to cloud operation. 19

Cumulus Project The Cumulus project includes: Development of advanced cloud service certification based on service testing data, service monitoring data and trusted computing platforms proofs. Developing an integrated framework of models, processes and tools for certification at all layers of the cloud stack. Three initial industrial scenarios: ehealth, Smart Lighting and Smart Transportation. Development that is conducted under a number of development efforts organized as Work Packages. 1. WP 1 Project Management 2. WP 2 Certification Models and Processes 3. WP 3 Core Certification Mechanisms 4. WP 4 CUMULUS-aware Systems Engineering 5. WP 5 Infrastructure Design and Integration 6. WP 6 Industrial Scenarios and Validation 7. WP 7 Dissemination and Exploitation 20

Cumulus Certification Work Package 2 Certifying cloud-based applications and services. CUMULUS assumes that a certificate may be generated through a combination of three types of evidence (aka sources of trust): a) Test-based - test data regarding the component that is to be certified, b) Monitoring-based - monitoring data regarding the component that is to be certified, and/or c) Trusted computing based - other certificates that may have been generated for other properties of the component of interest or other components that contribute its implementation and which service provider depends on. Different certificate types are envisioned as the product of this project: Test-based certificates Hybrid certificates combination of test-based and monitoring-based Monitoring certificates Dynamic certificates combination of monitoring-based and trusted computing-based Trusted computing-based certificates The design of these mechanisms will be informed by the Cumulus certification models and processes that will be developed in work package WP2. 21

Professional Cloud Security Certifications 1. Cloud Security Alliance Cloud Computing Knowledge Certification The CCKS certification is vendor-neutral, certifies competency in key cloud security areas based on the Cloud Security Alliance Security Guidance for Critical Areas of Focus in Cloud Computing V3, English language version, and the ENISA report "Cloud Computing: Benefits, Risks and Recommendations for Information Security." 2. Cloud Certification Council Provides professional certifications in specific areas of cloud computing 3. Cloud U - Rackspace a vendor-neutral curriculum designed for IT professionals and business leaders that covers and certifies knowledge of the fundamentals of Cloud Computing 4. CompTIA Cloud Essentials covers the basic fundamentals of cloud computing and covers migration to the cloud and governance of cloud computing environments 5. Cloud Certified Professional -- CloudSchool.com offers a number of vendor-neutral cloud certifications aimed at competency in specific areas of cloud computing including Cloud Architects, Cloud Technology Professionals, Cloud Governance, and Cloud security, among others. 22

Professional Cloud Security Certifications 6. IBM Certified Cloud Solution Architect v1 and v3 demonstrate the design, plan, architecture and management capabilities for IBM's cloud computing infrastructure 7. Google Certified Deployment Specialist covers the fundamental skills, knowledge and technical expertise required to deploy Google Apps for Business and Education 8. Salesforce.com Certified Professional offers several certification tracks, including Salesforce Administrator, Force.com Developer, Implementation Expert, and Architect 9. VMware Certified Professional offers six cloud-specific certifications, from beginner to advanced in a variety of cloud and virtualization-related technologies and methodologies. 10. Red Hat Certificate of Expertise in Infrastructure-as-a-Service measures professionals' ability to design, build, deploy and manage private clouds based on the Red Hat Enterprise Linux OpenStack platform 23

Cloud Security Alliance Practitioner Certification Certificate of Cloud Security Knowledge (CCSK) The CCSK certification is vendor-neutral, and certifies competency in key cloud security areas. Time-limited on-line exam of 60 multiple choice questions pass is 80% The test is based on the Cloud Security Alliance Security Guidance for Critical Areas of Focus in Cloud Computing V3, and the ENISA report Cloud Computing: Benefits, Risks and Recommendations for Information Security. The CSA offers CCSK Training Security Guidance for Critical Areas of Focus in Cloud Computing V3 3 sections: Cloud Architecture, Governing the Cloud and Operating in the Cloud 14 Domains 1. Cloud Computing Architecture Framework 2. Governance and Enterprise Risk Management 3. Legal Issues: Contracts and Electronic Discovery 4. Compliance and Audit Management 5. Information Management and Data Security 6. Interoperability and Portability 7. Traditional Security, Business Continuity and Disaster Recovery 8. Data Center Operations 9. Incident Response 10. Application Security 11. Encryption and Key Management 12. Identity, Entitlement and Access Management 13. Virtualization 14. Security as a Service 24

Cloud Credential Council Certifications The Cloud Credential Council (CCC) is a global provider of vendorneutral cloud computing training and certification offering 9 certification programs. There are 5 professional level certifications, 2 associate level certifications. Training and a certificate of completion can be obtained for the US Federal FedRamp standard. Each certification focuses on a specific topic within the cloud computing space. The CCC provides training course and certification exams for each of the certification programs CCC provided an opportunity to be grandfathered into a certification by proving existing experience and knowledge in Cloud Computing 25

Cloud Credential Council (CCC) Professional Cloud Solutions Architect designed for senior technology professionals who are architecting and designing the future generation of technology solutions Professional Cloud Security Manager globally known as the standard of achievement for security and governance professionals involved with cloud-based solutions Professional Cloud Service Manager Globally recognized certification for Service Management professionals Professional Cloud Administrator demonstration of knowledge about Cloud Provisioning and Administration, Cloud Bursting, Interoperability, Strategic Policy Design, Disaster Recovery and Business Continuity, as well as Performance Measurement and Monitoring Professional Cloud Developer Globally recognized certification for Developers of cloud solutions. Cloud Business Associate demonstrates that candidates have the basic skill set and knowledge associated with cloud and business Cloud Technology Associate demonstrates that candidates have the basic skill set and knowledge associated with cloud and virtualization Executive FedRamp Credential Demonstrate a thorough understanding of aligning to FedRamp standard 26

Cloud School Certified Cloud Professional (CCP) The Arcitura Cloud School offers a program of cloud professional certifications for several areas of cloud security specializations. The Cloud School provides vendor-neutral cloud computing training and certification offering 9 certifications. 1. Certified Cloud Professional 2. Certified Cloud Technology Professional 3. Certified Cloud Architect 4. Certified Cloud Security Specialist 5. Certified Cloud Security Governance Specialist 6. Certified Cloud Storage Specialist 7. Certified Cloud Virtualization Specialist 8. Certified Cloud Capacity Specialist 9. Certified Cloud Trainer The Cloud School provides on-site training, public workshops and selfstudy programs There are 21 course modules covering specific cloud security topics offered in individual one-day courses. The certifications are based of 3 to 5 of the 21 modules. Exams are provided through Prometric testing centers. 27

CCP Certification Matrix 28

Summary 1. Determine what level of assurance is required Is certification required or is self-assessment sufficient? Do you need attestation to satisfy any regulatory requirements? 2. The CSA STAR certification has a high level of rigour and the potential for broad acceptance. Based on ISO 27001 certification The CSA CCM is aligned with most of the current security frameworks and requirements The CCM provides a good framework for controls even if certification is not planned 3. There are lots of competency cloud security certifications to choose from pick the one that will have the broadest recognition in your area of involvement. Many professional certifications include training for the certification 4. The Cumulus project is very ambitious but will likely produce a broad set of results if the effort persists. 29