Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto



Similar documents
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

Security Issues in Cloud Computing

Services Providers. Ivan Soto

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

Managing Cloud Computing Risk

Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

How To Protect Your Cloud Computing Resources From Attack

Cloud Computing: Risks and Auditing

Cloud Computing; What is it, How long has it been here, and Where is it going?

D. L. Corbet & Assoc., LLC

Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate.

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

Information Security: Cloud Computing

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Validating Enterprise Systems: A Practical Guide

IS PRIVATE CLOUD A UNICORN?

Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1

International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: , Volume-1, Issue-5, February 2014

External Supplier Control Requirements

Cloud Security. DLT Solutions LLC June #DLTCloud

Cloud Computing Security Issues


Anatomy of a Cloud Computing Data Breach

Cloud Security and Managing Use Risks

Cloud Computing and Records Management

What Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Cloud Security:Threats & Mitgations

The HIPAA Security Rule: Cloudy Skies Ahead?

Clinical Trials in the Cloud: A New Paradigm?

Newcastle University Information Security Procedures Version 3

Enterprise Governance and Planning

Security & Trust in the Cloud

Cloud Computing. Bringing the Cloud into Focus

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

Validating Cloud. June 2012 Merry Danley

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

SYLOGENT DEDICATED HOSTING

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit

Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework

LEGAL ISSUES IN CLOUD COMPUTING

Auditing Cloud Computing and Outsourced Operations

Is it Time to Trust the Cloud? Unpacking the Notorious Nine

Data Protection: From PKI to Virtualization & Cloud

Cloud-Security: Show-Stopper or Enabling Technology?

Strategies for Secure Cloud Computing

Pharma CloudAdoption. and Qualification Trends

SERENA SOFTWARE Serena Service Manager Security

A HYPE-FREE STROLL THROUGH CLOUD STORAGE SECURITY

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

CLOUD COMPUTING DEMYSTIFIED

IT Audit in the Cloud

Top 10 Cloud Risks That Will Keep You Awake at Night

Cloud Services Overview

PCI Compliance for Cloud Applications

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

ADOPTING CLOUD COMPUTING AS AN ICT DEPLOYMENT STRATEGY FOR DELIVERING SERVICES IN THE GOVERNMENT

Developing a Risk-Based Cloud Strategy

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

CSO Cloud Computing Study. January 2012

Cloud Computing for SCADA

Information Technology: This Year s Hot Issue - Cloud Computing

Cloud for Credit Unions Leveraging New Solutions to Increase Efficiency & Reduce Costs Presented by: Hugh Smallwood, Chief Technology Officer

Cloud Models and Platforms

Information Shield Solution Matrix for CIP Security Standards

Technology & Business Overview of Cloud Computing

AskAvanade: Answering the Burning Questions around Cloud Computing

Moving beyond Virtualization as you make your Cloud journey. David Angradi

Information Security Policies. Version 6.1

What Cloud computing means in real life

White Paper: Librestream Security Overview

Qualification Guideline

Cloud Computing in a Regulated Environment

The NIST Definition of Cloud Computing (Draft)

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Orchestrating the New Paradigm Cloud Assurance

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

Incident Handling in the Cloud and Audit s Role

Attachment A. Identification of Risks/Cybersecurity Governance

Transcription:

Cloud Computing: What needs to Be Validated and Qualified Ivan Soto

Learning Objectives At the end of this session we will have covered: Technical Overview of the Cloud Risk Factors Cloud Security & Data Integrity Applying a Risk Based Approach to Qualification & Validation 2

What is the Cloud? 3

What is the Cloud? NIST Definition Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models 4

Three Service Models Cloud Software as a Service (SaaS). The capability provided to the consumer is to use the provider s applications running on a cloud infrastructure Cloud Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider Cloud Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software 5

Four Deployment Models Private cloud. The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise Community cloud. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns Public cloud. The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services Hybrid cloud. The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability 6

Security and Compliance Virtualization forms the foundation for building private clouds. Security must change to support both. --Gartner, 2010 Rate Card Hands-off Self-service The Cloud? Control? Security? Compliance Internal IT

Compliance Challenge Security, Data Integrity, Visibility & Control Policy Corporate Border Applications and Data Software as a Service Platform as a Service Infrastructure as a Service X as a Service Corporate Office Manufacturing Sites Sales force @ airport Mobile User Attackers Business Partners Customers Sales force @ Starbucks Employee Home Office

Cloud Data & Security Management Challenge Audit/Reporting/Alerting Secure Mobile Devices Data Security at Rest Data Security in Transit Strong Authentication Personal-business-regulated Data Co-mingled Regulated company data Non regulated company data Co-mingled Data segregation

Risk in the Cloud Access Control Policy Electronic Record Policy Acceptable Use Policy Threat Protection Policy Record Retention Policy Trust & Reliability in a cloud environment centers on four core concepts: Security Issues around data integrity and resource access control, encryption and incident detection Control The ability of the enterprise to directly manage how and where data and software is deployed, used and destroyed Service-Level Management The definition, contracting and enforcement of service level agreements between a variety of parties Compliance Conformance with required regulatory, legal and general industry requirements (such as Part 11, Annex 11, HIPAA and Sarbanes-Oxley)

Cloud Security Issues Abuse and Nefarious Use Password and Key cracking, Launching dynamic attack points, Hosting malicious data, Botnet command and control, and Building rainbow tables. Insecure Interfaces and APIs Used for provisioning, management, orchestration, and monitoring. Security/availability dependent on security of APIs. Weak APIs expose data to variety of security issues. Malicious Insiders Combo of IT Services, cloud customers, competitors + lack of transparency of security process and procedure practices of Cloud provider. Shared Technology Issues CPUs, disk partitions, other shared components not designed for strong compartmentalization.

Cloud Security Issues (cont) Data Loss or Leakage Risk can be amplified due to architectural/operational characteristics of cloud services,, inconsistent crypto use, residual data issues, data center reliability, and disaster recovery Account or Service Hijacking Credentials/passwords reuse, Eavesdrop on connection, Redirect users illegitimate site then launch attack based on your reputation Unknown Risk Profile What are details of security procedures? Compliance details? configuration hardening, patching, audit/logging? How are logs stored? What info will vendor disclose in security incident? Service Level Agreement!

Risk Mitigation Considerations Identification and Assessment of Cloud Component Implementation of Controls Security & Data Security

Identification & Assessment Identification and Assessment of Cloud Components What components define the configured cloud? Where are they? How many applications running? How many users? All GMP or not? Hardware and Applications under Change Management? How changes are communicated and under control? How is data integrity and security provided in the cloud?

Implementation of Controls Change Management Configuration Management Security Management Server Management Client Management Network Management age e Problem Management Help Desk Backup, Restore, and Archiving Disaster Recovery Performance Monitoring & Reporting Supplier Management Periodic Review System Retirement

Cloud Security & Data Integrity Privileged user access. Who has access to your data? Regulatory compliance. Customers are ultimately responsible for the security and integrity of their own data, even when it is held by a service provider Data location where in the world is the cloud Data segregation. Data in the cloud is typically in a shared environment alongside data from other customers. Encryption is effective but isn't a cure-all. "Encryption accidents can make data totally unusable, and even normal encryption can complicate availability," Gartner Cloud-computing Security Risks Backup & Recovery. Make sure that your cloud is recoverable

Applying a Risk Based Approach to Qualification and Validation 17

Supplier Assessment Goal Determine suppliers ability to meet clients expectations related to controls needed to ensure security, data integrity, compliance with client procedures and regulatory expectations Off-site audit should be consider as the first step to assess cloud computing suppliers Off-site audit should be used to determine if the supplier merits further consideration On-site audit may be performed after the supplier is deemed capable to meet client expectations The scope of the audit should be based on the type of service that will be provided to the customer 18

Service Level Considerations Availability and performance Change management Quality of service Security Business continuity / Backup and Recovery Personnel Qualification 19

Service Level Considerations (Cont.) Testing Incident management Defining documentation and information ownership/responsibilities p Performance monitoring expectations Incident reporting Alert & escalation procedures Which processes and procedures will be used? 20

Hardware Qualification? Goal should be to leverage vendor hardware testing Lite application IQ to verify hardware is adequate to host application Infrastructure security verification Effort should be based on the results of the supplier assessment and audit 21

Validating Applications in the Cloud Risk based approach based on the risk level of the application User Requirements Specification IQ simple verification that hardware requirements are met OQ verify critical high risk system functions Security & Data Integrity Audit trails Electronic Signatures High & Medium Risk Requirements PQ verify workflow & business process requirements 22

Change Management Consider the following Visibility to infrastructure changes Adequate notification Ability to assess changes (depends on the service model) Approval of changes prior to release (depends on the service model) Testing Change impact assessments (technical, GxP, process) 23

Periodic Review and Assessment Citi Critical lifcl Cloud dis outside your organization Consider measuring SLA adherence during periodic review Consider performance requirements Incident and problem management review 24

Summary Cloud Technical Overview Security & Data Integrity Change Management Risk Based Validation Approach Periodic Review and Assessment 25