ENISA and Cloud Security



Similar documents
ENISA and Cloud Security

ENISA and Cloud Security

Cloud and Critical Information Infrastructures

Prof. Udo Helmbrecht

Security and privacy standardization for the SME community

Cloud Computing Security ENISA. Daniele Catteddu, CISM, CISA. DigitPA egovernment e Cloud computing.

How To Write An Article On The European Cyberspace Policy And Security Strategy

Cloud Computing Security ENISA. Daniele Catteddu, CISM, CISA. Convegno Associazione Italiana Information Systems Auditors.

Dr. Vangelis OUZOUNIS Senior Expert Security Policies ENISA.

Cloud computing: benefits, risks and recommendations for information security

Cloud Security Standardisation & Certification. Arjan de Jong Policy Advisor Information Security

European Cloud Computing Strategy

Cyber Security and Cloud Computing. Dr Daniel Prince Course Director MSc in Cyber Security

ENISA Cloud Computing Security Strategy

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

Cooperation in Securing National Critical Infrastructure

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

Cloud Security Introduction and Overview

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

How to procure a secure cloud service

How to ensure control and security when moving to SaaS/cloud applications

Article 29 Working Party Issues Opinion on Cloud Computing

How To Understand And Understand The European Priorities In Information Security

National Cyber Security Strategies

Cloud computing and personal data protection. Gwendal LE GRAND Director of technology and innovation CNIL

CLOUD COMPUTING FOR ehealth DATA PROTECTION ISSUES

Cloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak

Achieving Global Cyber Security Through Collaboration

European Cloud Computing. Strategy. Cloud standards. Ken Ducatel DG CONNECT

Cyber Europe Key Findings and Recommendations

ENISA TRAINING. Tentative agenda for workshop. Supported and co- organised by: TLP WHITE JANUARY 2016

Cloud Computing Governance & Security. Security Risks in the Cloud

Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA:

Cisco Cloud Assessments. Justin Tang

Virtual Appliance Instructions for ENISA CERT Training TLP WHITE APRIL European Union Agency For Network And Information Security

ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt

Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me?

The demand of Cloud Computing in Europe: drivers, barriers, market estimates

Expert Group on Cloud Computing Services and Standards ( EGCCSS ) Formation of Working Groups

Electronic Signatures in Norway Supervision and Legal Aspects

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015

An SME perspective on Cloud Computing November 09. Survey

Information Security Seminar 2013

COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'

The NREN s core activities are in providing network and associated services to its user community that usually comprises:

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Security Framework for Governmental Clouds

Boosting Productivity and Innovation Through. Public Sector Compliant Cloud Services

Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014

Cloud Security Alliance: Industry Efforts to Secure Cloud Computing

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects

Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL

TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1

Practical and ethical considerations on the use of cloud computing in accounting

The Education Fellowship Finance Centralisation IT Security Strategy

ICT 7: Advanced cloud infrastructures and services. ICT 8: Boosting public sector productivity and innovation through cloud computing services

European Union Agency for Network and Information Security ENISA ANNUAL REPORT

UCD IT Services. Security Assurance review for Microsoft Cloud Service adoption at UCD

On Premise Vs Cloud: Selection Approach & Implementation Strategies

Cloud Risk Management: How to Consolidate your CSP and Corporate Risk Profile

Cloud Technology Platform Enables Leading HR and Payroll Services Provider To Meet Solution Objectives

The NREN cloud strategy should be aligned with the European and national policies, but also with the strategies of the member institutions.

EuroCloud Star Audit. A strong partnership that provides you with a competitive advantage

Cloud Security Alliance New Zealand Contribution to the Privacy Commissioner. 23 February 2012

NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA

CLOUD COMPUTING Contractual and data protection aspects

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

Cloud Computing. and the European Strategy. State of play: Dan-Mihai CHIRILĂ DG CONNECT

Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region

VACANCY NOTICE FOR THE POSITION OF SENIOR EXPERT IN SECURITY TOOLS AND ARCHITECTURE Ref. ENISA/TA/AD/2007/13

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

INFRASTRUCTURE ARCHITECTURE BLUEPRINT

Transcription:

ENISA and Cloud Security Rossen Naydenov Network Information Security Officer Critical Information Infrastructure Protection Department - ENISA European Union Agency for Network and Information Security

Agenda About ENISA Benefits of Cloud Computing Risks in Cloud Computing ENISA Activities in Cloud Security Summary 2

Positioning ENISA activities 3

What is Cloud Computing? Cloud Computing is a business model another way of providing services using such a service is considered outsourcing Cloud computing is a deployment model information processing in shared environment resources can be quickly scaled to meet changing in demands 4

Cloud Opportunities Economies of Scale Better ROI More efficient resource utilization also means cost savings Support innovation Easier deployment of new services Faster time to market High Resiliency Better back up services Better business continuity Standardised solutions Better patch management Better software update management Portable and interoperable 5

Cloud Challenges Isolation Failures One Cloud customer might be able to influence the resources of another (CPU, Memory)..or have access to another customers data (data breach) Loss of Governance Customer cedes some control to the provider (depending on the deployment model) This also affects security Management GUI and API compromise Identity and access management are particularly important Full access to all resources (keys to many kingdoms) Data protection The CSP usually becomes data processor in terms of DP legislation Data processing in datacentres abroad can imply that certain DP requirements cannot be met in the Cloud 6

ENISA engages the community ENISA Cloud Security and Resilience experts group 7

ENISA s work in the area of Cloud 2009 Cloud computing risk assessment 2009 Cloud security Assurance framework 2012 Procure secure (Security in SLAs) 2013 Critical cloud computing 2013 Incident reporting for cloud computing 2013 Securely deploying GovClouds 2013 Support EU Cloud Strategy 2014 Cloud Certification Meta-Framework 2014 Procurement security in GovClouds 2015 Cloud Security guide for SMEs 2015 Cloud Opportunities And Risks in the Finance sector http://www.enisa.europa.eu/activities/resilience-and-ciip/cloud-computing 8

Risk Assessment in the Cloud Famous 2009 Guide Updated in 2012 Security Guide for SMEs 2015 9

Security guide for SMEs Small and medium size enterprises (SMEs) are an important driver for innovation and growth in the EU Cloud Computing is a means for innovation, but cloud is for the SMEs still a challenge. ENISA in this study presents: - 11 security opportunities (compared to legacy IT benefits) - 11 security risks (compared with legacy IT risks) - 12 security questions for the SME to ask the provider (in one security cheat sheet - 2 comprehensive scenarios - Some legal advice 10

and online tool Where you can: rate your opportunities from cloud rate your risks produce a risks map get your security questions 11

Governmental Cloud reports (1/2) 2010: Guide on security and resilience for Governmental Clouds Presentation of the security benefits and drawbacks for the public sector to go in the cloud First steps need to be done towards taking the decision to go cloud 2013: Good practice guide on how to securely deploy Governmental Clouds Definition of a governmental cloud (in a mature market) State of cloud computing adoption in the EU public sector Case studies of different approaches in adopting a cloud solution 12

Governmental Cloud reports (2/2) 2014: Security Framework for Governmental Clouds 4 phases, 10 different steps and the specific actions to be taken in each one 4 use case scenarios to find the solutions that better fits each implementation 13

ENISA s Critical Cloud Study First assessment of CIIP aspects of Cloud computing Illustrates dependencies and provides examples for failures Provides recommendations for Cloud security governance from the CIIP perspective Conclusions can be applied to Governmental Cloud usage 14

Incident Reporting for Cloud Computing Cloud computing incidents could have major impact. Large scale incidents should be reported to improve trust Public sector and industry should agree on scope and thresholds of reporting. ENISA suggests a model for incident reporting of cloud incidents involving CSPs and regulators. 15

ENISA in the area of Cloud Certification Strategic objective of EC Strategy: List of voluntary certification schemes Cloud Certification Schemes List (CCSL): List of existing certification schemes 13 Certification schemes included Powered by ENISA, supported by the EC and the Cloud Selected Industry Group (C-SIG) Cloud Certification Schemes Metaframework (CCSM): Meta-framework based on existing certification schemes Mapping detailed ICT security requirements of the public sector in the EU (11 countries and more will come) Matrix will results to be used for procurement Visit: https://resilience.enisa.europa.eu/cloud-computing-certification 16

Cloud in the Critical Sectors Critical Clouds Cloud Computing in the Finance Sector Cloud supporting Health care systems and services Cloud supporting egovernment 17

Good Practices for the use of Cloud Computing in the area of Finance Sector Identification of critical challenges to cloud computing adoption in the Finance sector Assess legal and regulatory context (challenges and opportunities) in all member states Support industry and understand their uptake why do some use and some don t use cloud Propose recommendations 18

Big Data Security Challenges One of the key functionalities of great interest for Cloud computing Big Data adoption is now booming, however: BD Infrastructure is not secure by default Encryption might not be a practical option in real time systems Accountability, Authentication, Auditing and Logging are rarely implemented (again for performance reasons) ENISA is doing study on Big Data to help identify security challenges and provide good practices 19

Summary ENISA s Objectives Address Industry s Security concerns Improve security baseline levels Rationalise Compliance costs Harmonise Security Objectives Where you can help Provide insights on the key information security challenges you face Contribute information to work in progress Raise questions on current regulations 20

Thank you! PO Box 1309, 710 01 Heraklion, Greece Tel: +30 28 14 40 9710 info@enisa.europa.eu www.enisa.europa.eu