ISACA Presentation. Cloud, Forensics and Cloud Forensics



Similar documents
Data Integrity Check using Hash Functions in Cloud environment

Cloud Computing; What is it, How long has it been here, and Where is it going?

Security Aspects of Cloud Computing

Security Issues in Cloud Computing

Beyond the Internet? THIN APPS STORE FOR SMART PHONES BASED ON PRIVATE CLOUD INFRASTRUCTURE. Innovations for future networks and services

Cloud Security. DLT Solutions LLC June #DLTCloud

The Hidden Extras. The Pricing Scheme of Cloud Computing. Stephane Rufer

THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

The Impact of Cloud Computing on Saudi Organizations: The Case of a Telecom Company

Key Considerations of Regulatory Compliance in the Public Cloud

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Cloud Security Introduction and Overview

What Cloud computing means in real life

How To Manage Cloud Data Safely

Information Technology: This Year s Hot Issue - Cloud Computing

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Cloud Computing Governance & Security. Security Risks in the Cloud

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

Cloud Computing Architecture and Forensic Investigation Challenges

Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken )

LEGAL ISSUES IN CLOUD COMPUTING

Enhancement of XP for Cloud Application Development Sara Tariq, Muhammad Mohsin Nazir, Farhat Saleemi

THOUGHT LEADERSHIP. Journey to Cloud 9. Navigating a path to secure cloud computing. Alastair Broom Solutions Director, Integralis

Security & Trust in the Cloud

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Managing Cloud Computing Risk

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Information Security: Cloud Computing

Digital Forensics for IaaS Cloud Computing

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

Cloud ERP: Implementation of Enterprise Resource Planning Using Cloud Computing Technology

How To Protect Your Cloud Computing Resources From Attack

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

Protec'ng Data and Privacy in a World of Clouds and Third Par'es Vincent Campitelli

Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Emerging Technologies In The Implementation Of ERP

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Research on Digital Forensics Based on Private Cloud Computing

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Addressing Data Security Challenges in the Cloud

Strategies for assessing cloud security

Assessing Risks in the Cloud

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Cloud Computing and Records Management

Maximizing Configuration Management IT Security Benefits with Puppet

Cloud Security and Managing Use Risks

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Key Enablers for the Cloud Service Broker: Identity, Privacy, and Security

Cloud Computing Trends, Examples & What s Ahead

Geoprocessing in Hybrid Clouds

How To Design A Cloud Data Storage Service For A Cloud Computer System

Introduction to Cloud Computing

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

Cloud Services Overview

Cloud Computing Security Issues

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

CLOUD COMPUTING DEMYSTIFIED

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Cloud Infrastructure Security

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka.

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Designing a Data Solution with Microsoft SQL Server 2014

Cloud computing security using encryption technique


Cloud Computing and Digital Preservation: A Comparison of Two Services. Amanda L. Stowell. San Jose State University

Why You Should Consider Cloud- Based Archiving. A whitepaper by The Radicati Group, Inc.

Cloud Courses Description

Infrastructure as a Service (IaaS) Dancik International and Peak 10

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Transcription:

ISACA Presentation Cloud, Forensics and Cloud Forensics

Agenda What is the Cloud What is Forensics Challenges Cloud poses to Information Security and Forensic Investigations Using Cloud technologies to support investigations and forensics Risks Control, Compromise and Chain of Custody

Understanding the Audience By a show of hands -how many people know what the cloud is? How many people know what a virtual machine is? How many people know what software as a service is? How many people know what computer forensics is?

What is the Cloud Simply a datacenter infrastructure maintained by a third party that delivers on-demand virtual computing, platform and application services

Types of Cloud Computing

Spectrum of the Cloud

Examples

Cloud -Internal, Private, Public

Advantages and Disadvantages

Compliance Concerns Numerous regulations pertain to the storage and use of data, Payment Card Industry Data Security Standard(PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Sarbanes-Oxley Act, among others. Many of these regulations require regular reporting and audit trails. Cloud providers must enable their customers to comply appropriately with these regulations.

Security and Compliance Planning Business continuity and data recovery Cloud providers have business continuity and data recovery plans in place to ensure that service can be maintained in case of a disaster or an emergency and that any data loss will be recovered.these plans are shared with and reviewed by their customers. Logs and audit trails In addition to producing logs and audit trails, cloud providers work with their customers to ensure that these logs and audit trails are properly secured, maintained for as long as the customer requires, and are accessible for the purposes of forensic investigation (e.g., ediscovery). Unique compliance requirements In addition to the requirements to which customers are subject, the data centers maintained by cloud providers may also be subject to compliance requirements. Using a cloud service provider (CSP) can lead to additional security concerns around data jurisdiction since customer or tenant data may not remain on the same system, or in the same data center or even within the same provider's cloud. [14]

Cloud Security Cloud Security Alliance -largest and arguably most comprehensive player in cloud security standards NIST - http://www.nist.gov/itl/csd/cloud-012412.cfm IEEE project P2301, Guide for Cloud Portability and Interoperability Profiles, ENISA -published Procure Secure: A Guide to Monitoring of security service levels in cloud contracts. Beware SAS 70 -has already seen its light fade in world of cloud services

Obstacles and Opportunities

What is Computer Forensics Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.

Lab Based Forensics Forensics has traditionally been a lab based practice Media copied and examined directly

Case Study Over Time Imagine you had an employee suspected of stealing company information and you are a forensic examiner assigned to investigate the electronic media Fifteen years ago, that meant you were on a plane!

Traditional Best Practice Suspect Forensic Copy Read Read/ Write Hash Verification 100% Match

Chain of Custody and Evidence Protection

2003 to Present? -Enterprise Network Acquisition Suspect Forensic Copy Read Read/ Write Hash Verification 100% Match

A physical safe has been replaced by -Network Area Storage

What Affect Does the PrivateCloud Have On Forensics Personal Device, Virtual Image, Server Host Evidence Collection

What Affect Does the Private Cloud Have On Forensics Suspect Forensic Copy Read Read/ Write Hash Verification 100% Match

What Affect Does the PublicCloud Have On Forensics BYOD, Virtual Image, Server Host Evidence Collection

Effects on InfoSecand Information Security Investigations Control and Ownership Data Insider Threat - Espionage, Theft, Access External Threat - Provider compromise Provider hostage nickel and dime fees Investigations No access to hardware, hard drives, etc Limited access Virtual Machines Personal device Consent required. No covert investigation capability without Law Enforcement or Subpoena

Recommendations We are in the midst of the largest technical evolution in a couple decades Read up on current Cloud security standards, start small but definitely start. Get your feet wet if your not already swimming Choose a Hybrid between Internal and private cloud. Design and control the VM s used by your company Install advanced monitoring tools into the VM Image may be better for evidence than traditional forensics

Recommendations Monitor or block access to Cloud instances not managed by your company Hold off on BYOC for a while (Bring your own Cloud) Be careful doing BYOD and Cloud at the same time The FILE is the new PERIMETER Information Rights Management: has its time come? DLP? The cloud is inevitable, it just makes sense. Don t fight it, just use good judgment and move at the right pace

Forensics as a Service Using a combination of IaaS, DaaSand SaaS, a forensic infrastructure could be designed to be cloud based. Instant Virtual Lab, set up anywhere, anytime Snapshot and replicate machines for very powerful cracking capability Scale up for large processing or ediscovery jobs Pay for what you use So VERY different from where we were 15 years ago!

Thank You Thoughts? Questions?

Credits Above the Clouds: A Berkeley View of Cloud Computing; Michael Armbrust, Armando Fox, ReanGriffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, GunhoLee, David Patterson, Ariel Rabkin, Ion Stoica, and MateiZaharia; UC Berkeley Reliable Adaptive Distributed Systems Laboratory; http://radlab.cs.berkeley.edu/; February 10, 2009 http://www.comparethecloud.net/cloud-computing/#types http://www.cloudstrategies.com/2010/05/cloud-spectrum-iaas-paas-saas/ http://www.esecurityplanet.com/network-security/cloud-security-standards-what-you-should-know.html https://en.wikipedia.org/wiki/cloud_computing www. Logicube.com