Cloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak



Similar documents
A Flexible and Comprehensive Approach to a Cloud Compliance Program

EuroCloud Deutschland_eco e.v. Cloud Computing is the future! For sure! But secure!

The Standardisation Environment for Cloud Computing

Cloud Security Introduction and Overview

Attacking the roadblocks preventing aggressive adoption of Cloud Standards:

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Cloud Security Certification

Hans Bos Microsoft Nederland.

How to ensure control and security when moving to SaaS/cloud applications

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

Cloud Computing An Auditor s Perspective

Securing the Microsoft Cloud Infrastructure. Reto Häni Chief Security Officer Microsoft Western Europe MEET SWISS INFOSEC!

Cyber Security and Cloud Computing. Dr Daniel Prince Course Director MSc in Cyber Security

Protec'ng Data and Privacy in a World of Clouds and Third Par'es Vincent Campitelli

Cloud Computing Security Issues

Information Security Management System for Microsoft s Cloud Infrastructure

Building an Effective

How To Secure Cloud Computing

CLOUD COMPUTING OVERVIEW OF CLOUD COMPUTING PRINCIPLES AND TECHNOLOGIES

European Cloud Computing. Strategy. Cloud standards. Ken Ducatel DG CONNECT

SUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR

How To Protect Your Cloud Computing Resources From Attack

SECURE CLOUD COMPUTING

On Premise Vs Cloud: Selection Approach & Implementation Strategies

Cloud Computing Governance & Security. Security Risks in the Cloud

White Paper How Noah Mobile uses Microsoft Azure Core Services

Adding value as a Cloud Broker. Nick Hyner Director Cloud Services EMEA Twitter Dell.com/Cloud

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

Public Cloud Workshop Offerings

Selecting a Cloud Service Provider (CSP)

The Future of Cloud Computing: Elasticity, Legacy Support, Interoperability and Quality of Service

Microsoft s Compliance Framework for Online Services

Securing the Microsoft Cloud

Cloud Security and Managing Use Risks

Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL

Compliance and the Cloud: What You Can and What You Can t Outsource

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Cloud Security Standards. Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority

The Cloud Opportunity: Italian Market 01/10/2010

CPNI VIEWPOINT 01/2010 CLOUD COMPUTING

How To Choose A Cloud Computing Solution

Cloud Security. DLT Solutions LLC June #DLTCloud

Transparency. Privacy. Compliance. Security. What does privacy at Microsoft mean? Are you using my data to build advertising products?

HEC Security & Compliance

Cloud computing: benefits, risks and recommendations for information security

{Moving to the cloud}

Interoperability & Portability for Cloud Computing: A Guide.

Cloud Services Overview

GRC Stack Research Sponsorship

TOOLS and BEST PRACTICES

Cloud Security Benchmark: Top 10 Cloud Service Providers Appendix A E January 5, 2015

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Certified Cloud Computing Professional VS-1067

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors

Information Security ISO Standards. Feb 11, Glen Bruce Director, Enterprise Risk Security & Privacy

Cloud Security & Risk. Adam Cravedi, CISA Senior IT Auditor acravedi@compassitc.com

Global Efforts to Secure Cloud Computing. Jason Witty President, Cloud Security Alliance Chicago

What Cloud computing means in real life

I&IT Strategy & Cyber Security

Cloud Computing Standards: Overview and ITU-T positioning

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

White Paper on CLOUD COMPUTING

INFRASTRUCTURE AS A SERVICE BUYER S CHECKLIST

Security standards for cloud usage

Open Certification Framework. Vision Statement

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Cloud computing and personal data protection. Gwendal LE GRAND Director of technology and innovation CNIL

10 Considerations for a Cloud Procurement. Anthony Kelly Erick Trombley David DeBrandt Carina Veksler January 2015

Expert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II

The Cloud Security Alliance

Welcome. Panel. Cloud Computing New Challenges in Data Integrity and Security 13 November 2014

BUSINESS MANAGEMENT SUPPORT

SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS

Lecture 02b Cloud Computing II

A Survey on Cloud Security Issues and Techniques

IT Audit in the Cloud

CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs

Secure Cloud Computing

Securing the Microsoft Cloud

Understanding ISO and Preparing for the Modern Era of Cloud Security

Transcription:

Cloud Standardization, Compliance and Certification Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak

Todays Agenda IT Resourcing with Cloud Computing and related challenges Landscape of standards and certification The role of Zavod e-oblak within EuroCloud Conclusion

IT Resourcing - Data centric view </nav> X-Node IaaS PaaS SaaS Cooling Power and UPS LAN/WAN Power and UPS DC-Services Private Cloud Private IT Shared IT Access

Datacenter risks IT Provisioning Cabling Physical risks Power supply

Cyber crime Malicious insider Unsecure devices Cyberattack Malware

What is important for Customers Contract Regulations Technical and legal security Legal compliance Availability and SLA compliance CSP reliability (including sub providers) Prevention of Lock In Situations Usability and sustainability Data Privacy Data Security Data Center and Location Business Operations Software, Interoperability

Cloud assessment requires a wide area for review Scope Contract Topics Terms and Conditions, SLA, Regulations Data Security Legal requirements, data location, data privacy directives, export control,.. ISMS, Access control, Data Privacy Data Center Data separation, data delition, access monitoring, Technical and mechanical environment Business Operations Service Management Software Interoperability Data export functionality and completness, general usability, transparency

IT Resourcing Customer view SaaS Collaboration Market Place IaaS national IaaS WW SaaS CRM Data Bridge SaaS Collaboration White Label Identity </nav> PaaS DC #1 SaaS Collaboration Privat IT </nav> PaaS IaaS national IaaS WW DC #2 DC #3 DC #4 DC #N Privat Cloud SaaS HR

The European enterprise market Definition Small and Media Enterprises: up to 250 employees and less than 43 M sales per annum http://epp.eurostat.ec.europa.eu/cache/ity_offpub/ks-et-11-001/en/ks-et-11-001-en.pdf

Cloud Challenges 1 Efficiency of service provisioning a Usage of scalable architectures c Resource management & flexibility d Availability of services 2 Effectiveness of Services by users a Contracts incl. questions of liability b Control of Services by users c Governance/escalation mechanisms 3 Transparency of service delivery and billing a Billing incl. license management b Quality assurance and monitoring SLA c Type and location of Data processing 5 Data privacy 6 Interoperability a Migration in the/out of the Cloud b Ability to integrate into on-premise IT c Cloud federation 7 Portability between providers a Service portability b Data portability 8 Ensuring fair competition in the market 9 Compliance with regulatory requirements 4 Information Security a b c d Identity & rights management Privacy & integrity Access control, logging, attack prevention Verification & certification Source Analyse by Booz & Company und FZI (2012)

Cloud specific risks Data storage regional vs. global Legal requirements Lock in data migration Insufficient Interoperability Shared environment Mixed security requirements and data separation Change of Roles System/Network/ Operating System Hypervisor: CPU, Network, OS

Relevant standardization areas Type of standard File & exchange format Programming models Examples OVF, EC2, USDL, CIM SVM,EDI MapReduce, JAQL; PIG, HIVE Technology Protocols & Interface OCCI. CDMI, Cloud Audit, Google DLF,... Standard Components & reference architectures OpenStack, OSGI, NIST RM, IBM RM, DMTF, CTP,... Benchmark & tests Benchmarking Suits, Security Assessment,... Business models IaaS, PaaS, SaaS operating models, Hybrid, Community Service Level Agreements WS-Agreement (W3C), Business SLAs,... Management Condition of contracts EVB-IT, EU SVK, components of T&C, EULA Management models & processes ISO 27001/27002, ITIL, COBIT,... Controlling models & processes SSAE, SAS 70,... Legal Guidelines Legal requirements Voluntary Commitments Open Cloud Manifesto,... German BSI requirements, NIST UC, EuroCloud LDP&C EU data protection directive, national directive, Safe Harbor Company polices Internal polices,... Source Analyse by Booz & Company und FZI (2012) - http://www.trusted-cloud.de/documents/bmwi_cloud_standards_studie_e_web.pdf

Well known certification standards ISO/IEC 27001 specifies requirements for the establishment, implementation, monitoring and review, maintenance and improvement of a management system - an overall management and control framework - for managing an organization s information security risks. It does not mandate specific information security controls but stops at the level of the management system. The standard ISAE 3402 and SSAE 16 require that management of the service organization provide a written assertion attesting to the fair presentation and design of controls (in a Type 1 report). This written assertion is separate from the written representation obtained from management. The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards. research, develop, publish and promote an authoritative, up-to-date, international set of generally accepted information technology control objectives for day-to-day use by business managers, IT professionals and assurance professionals

Cloud specific auditing EuroCloud works close together with national and international organizations in the area of Technology, Research, Public Administration, Security, Data Privacy and Legal topics. This joined competence has been used to prepare knowledge, specify quality criteria, support cloud service provider to achieve a differentiating quality level to be successful in a high competitive market and to show the maturity level of the services by gaining the EuroCloud Star Audit certification. The Federal Risk and Authorization Management Program (FedRAMP) is a governmentwide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.

Overview and Scope Standard General Scope Areas addressed Cloud Readyness Comments ISO 27001 Information Security Management System Security, Compliance Limited Very generic. Need to understand which entity and what has been audited COBIT Information technology IT Management No General Quality Framework SAS 70/SSAE16/ ESAE3402 Transactions and Accounting Book keeping compliance Limited Add on for ERP Cloud Services EuroCloud Star Audit Cloud Service (SaaS, PaaS, IaaS) EU and national Law, Security, Compliance, EU and national Data Privacy, Interoperability Yes Common Scope, easy to understand for SMEs FedRamp Cloud Service Provider Security, US Compliance, Continuous monitoring Yes Huge burocracy, partially self assessment Control against NIST SP 800-53 R3 CSA Cloud Security Security, Interoperability Yes Excellent security assessment PCI DSS CC Payment Services Security Limited Very limited scope

Europe Leading standardisation organisations in cloud computing CC ITC ITC EuroCloud ETSI (European Telecommunications Standard Institute ENISIA (European Network and Information Security Agency) Comprehensive guidelines on law, data privacy and compliance, EuroCloud Star Audit ( Cloud Service quality mark ) Standards, analysis of gaps and testing systems for interoperability, specifications, use cases, co-ordination, standardization roadmap Cloud Computing SME Survey, Cloud Computing Information Assurance Framework, Cloud Computing Risk Assessment Source Analyse by Booz & Company und FZI (2012)

Resources to build Star Audit control sets ENISA Cloud Computing Risk Report Cloud Computing Security Cornerstone Paper Security Guidance Cloud Computing IT Audit Framework ISPRAT Study Cloud Computing Expert Group Law & Compliance Cloud Service Provider Certified Accountants

EuroCloud Competence EuroCloud Star Audit EuroCloud Self Assessment EuroCloud SLA critieria catalog EuroCloud CLOUD QUALITY INFORMATION PYRAMID EuroCloud Guidelines

EuroCloud Star Audit has a common scope» Statement about the reliability of the Cloud service, the service provider and involved sub-providers» Examination of the specific contractual elements with view on commissioned data processing Data Protection Regulations Book Keeping Regulations» Operational processes» SLA compliance» Lock In situations and vendor change options» Training and support» Interoperability

EuroCloud Star Audit is the only cross over certification with common scope Contract/ Law Data Security Data Privacy Data Center and Location Business Operations Software, Interoperability ISO 27001 ISO 9000 Cobit SAS 70 SSAE 16 ITIL

Future goal is continious monitoring Classic Audit Audit 1 Audit 2? Continuous monitoring

Conclusion Security, interoperability and legal compliance are success factors for a wide cloud adoption in Europe Cloud Services assessment is challenging, especially for SMEs Transparency about the CS supply chain is required The statement behind a certification should always be the same in order to be comparable We need standardization, legal harmonisation and ongoing knowledge transfer into the market

Futher links General Audit information http://www.saas-audit.de/en/ Study of the German Ministry of Economics and Technolgy http://www.bmwi.de/english/navigation/service/publications,did=476736.html Guideline Law, Data Privacy and Compliance http://en.eurocloud.de/2011/03/04/eurocloud-guidelines-cloud-computing-germanlaw-data-protection-and-compliance/ http://eurocloud.si/wp-content/uploads/eurocloud-smernice-prevedeno-inprilagojeno.pdf Slovene Cloud Computing and personal data protection guidelines from slovene data commisioner office and partners http://eurocloud.si/wp-content/uploads/cloud-computing-and-data-protection-engfinal1.pdf Webinar Cloud Security http://en.eurocloud.de/2010/09/01/09-09-10-webinar-cloud-security/

Thank you for your attention! Any Questions if not further details dalibor.baskovc@eurocloud.si

1 star requirements Stars Category Submission Focus 1 Contract &Compliance Cancellation policy Checking all cancellation agreements 1 Contract &Compliance Data transfer regulations Checking the data transfer process with examples 1 Contract &Compliance Data privacy protection requirement Analysis of the entire data protection sector 1 Contract &Compliance Data deletion at the end Checking the data deletion procedure 1 Operation infrastructure Proof minimum requirements for DC operation Analysis of existing certifications or on-site inspection

2 star requirements Stars Category Submission Focus 2 Contract &Compliance SLA Review Checking service commitments 2 Operation infrastructure Proof of minimum requirements for the DC operation redundant design for basic supply Analysis of risk areas or on-site inspection 2 Application Interfaces, API, export formats Analysis export formats in regards to basic migration ability (All requirements for the previous level must be fulfilled)

3 star requirements Stars Category Submission Focus 3 3 3 Contract &Compliance Possibility to select place of jurisdiction Checking contract information Implementation Implementation concept User support for new users and training offers Implementation Bug management Checking the support functions 3 On-site Audit Checking service levels and processes Special check list

4 star requirements Stars Category Submission Focus 4 Contract &Compliance Procedure documentation GdPDU (statutory requirements related to digital auditing) Validation and documentation pertaining to GdPDU (statutory requirements related to digital auditing) 4 Security Providing VPN access Analysis of the VPN infrastructure 4 Security Encrypting user data at file level Analysis of end to end encrypting mechanisms 4 Security Is data access excluded for administrators? Evaluation of system documentation 4 Security Inclusion of a customer system for IDM SAML applicability and analysis of IDM function 4 Security Rights role distribution carried out by customer Analysis of the application identity management 4 Operation infrastructure IX infrastructure Checking the IX connection 4 Operation infrastructure Power supply layout N+1 Checking the power supply layout 4 Operation infrastructure Air conditioning N+1 Checking the air conditioning 4 Operations processes End user support forum/cm base Checking the support forums 4 Operations processes Incident Mgmt System between provider and operator Evaluation of ticket system operator and processing of provider incidents 4 Operations processes Release management Evaluation of release management documentation 4 Operations processes Capacity management Evaluation of capacity management documentation 4 Operations processes Availability management Evaluation of availability management documentation 4 Operations processes Dashboard service reporting Evaluation of range of functions dashboard overview

5 star requirements Stars Category Submission Focus 5 5 5 5 5 5 Contract &Compliance Best price option Checking the pricing model Security Performing penetration test Evaluation of test procedures and results Operation infrastructure Operation infrastructure Operations processes Operations processes Emergency work stations Spread out data centers Emergency manual Emergency drills Checking emergency work stations Checking the DC redundancy Evaluation of the entire emergency plan Evaluation of last two emergency drills