John Essner, CISO Office of Information Technology State of New Jersey



Similar documents
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Security Issues in Cloud Computing

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Big Data, Big Risk, Big Rewards. Hussein Syed

Cloud Security for Federal Agencies

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

FISMA Implementation Project

Security Considerations for the Cloud

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

STATE OF NEW JERSEY Security Controls Assessment Checklist

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

Altius IT Policy Collection Compliance and Standards Matrix

VMware vcloud Air Security TECHNICAL WHITE PAPER

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

BMC s Security Strategy for ITSM in the SaaS Environment

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

The Protection Mission a constant endeavor

CTR System Report FISMA

FINAL May Guideline on Security Systems for Safeguarding Customer Information

DIVISION OF INFORMATION SECURITY (DIS)

Cisco Advanced Services for Network Security

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Security Controls What Works. Southside Virginia Community College: Security Awareness

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

Office of Inspector General

Securing the Microsoft Cloud

Cloud Computing Governance & Security. Security Risks in the Cloud

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.

Securing the Cloud Infrastructure

Cloud Security. DLT Solutions LLC June #DLTCloud

Cloud Security Who do you trust?

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

Managing Cloud Computing Risk

Domain 1 The Process of Auditing Information Systems

NIST A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Get Confidence in Mission Security with IV&V Information Assurance

05.0 Application Development

Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

Cloud Security and Managing Use Risks

How To Protect Your Cloud Computing Resources From Attack

FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

Information Security Program Management Standard

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services

Security Model for VM in Cloud

Microsoft s Compliance Framework for Online Services

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

PCI Compliance for Cloud Applications

Cloud Computing: Legal Risks and Best Practices

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Cybersecurity Health Check At A Glance

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

Information Blue Valley Schools FEBRUARY 2015

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

Risk Management of Outsourced Technology Services. November 28, 2000

How To Manage Cloud Data Safely

HIPAA Compliance Evaluation Report

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

State of Oregon. State of Oregon 1

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013

ISO COMPLIANCE WITH OBSERVEIT

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

Information Security Program CHARTER

How To Protect Your Cloud From Attack

Cloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs

Attachment A. Identification of Risks/Cybersecurity Governance

Autodesk PLM 360 Security Whitepaper

Orchestrating the New Paradigm Cloud Assurance

What We ll Cover. Defensible Disposal of Records and Information Litigation Holds Information Governance the future of records management programs

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Securing the Service Desk in the Cloud

Virtualization Impact on Compliance and Audit

GAO INFORMATION SECURITY. Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing. Report to Congressional Requesters

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Cloud Computing for SCADA

Assessing, Evaluating and Managing Cloud Computing Security

Transcription:

John Essner, CISO Office of Information Technology State of New Jersey

http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf

Governance Compliance Trust Architecture Identity and Access Management Software Isolation Data Protection Availability Incident Response Recommendations

Governance implies control and oversight. Policies, procedures, and standards. Asset Classification. Application development and information technology service acquisition. Design, implementation, testing, use, and monitoring of deployed or engaged services. Audit mechanisms and tools to ensure organizational practices.

Compliance refers to an organization s responsibility. Operate in agreement with established laws, regulations, standards, and specifications. Security Requirements ISO-27002 HIPAA FISMA Payment Card Industry (PCI) State of NJ - Service Contract Requirements for the Performance of Service Contracts within the United States http://www.state.nj.us/treasury/purchase/chapter92.shtml

Data Location - when information crosses borders, the governing legal, privacy, and regulatory regimes can be ambiguous and raise a variety of concerns. Electronic Discovery - involves the identification, collection, processing, analysis, and production of Electronically Stored Information (ESI) in the discovery phase of litigation.

Relinquishes direct control over many aspects of security and privacy. High level of trust onto the cloud provider. Responsibility to protect information and information systems. The risk and magnitude of the harm resulting from unauthorized access, use, disclosure, disruption, modification, or destruction. Ensure that service arrangements have sufficient means to allow visibility into the security and privacy controls and processes.

Data Ownership - the organization s ownership rights over the data must be firmly established in the service contract to enable a basis for trust and privacy of data. Third Party - cloud services that use third- party cloud providers to outsource or subcontract some of their services should raise concerns, including the scope of control over the third party. Visibility - continuous monitoring of information security requires maintaining ongoing awareness of security controls, vulnerabilities, and threats to support risk management decisions.

Ancillary Data - while the focus of attention in cloud computing is mainly on protecting application data, cloud providers also hold significant details about the accounts of cloud consumers that could be compromised and used in subsequent attacks. Risk Management - is the process of identifying and assessing risk to organizational operations, organizational assets, or individuals resulting from the operation of an information system, and taking the necessary steps to reduce it to an acceptable level

The software and hardware used to deliver cloud services can vary significantly among cloud providers for any specific service model. The physical location of the infrastructure is determined by the cloud provider. The design and implementation of the reliability, resource pooling, scalability, and other logic needed in the support framework.

Attack Surface - the hypervisor or virtual machine monitor is an additional layer of software between an operating system and hardware platform that is used to operate multi-tenant virtual machines and is common to IaaS clouds. Virtual Network Protection. Most virtualization platforms have the ability to create softwarebased switches and network configurations as part of the virtual environment.

Virtual Machine Images - IaaS cloud providers and manufacturers of virtual machine products maintain repositories of virtual machine images. Client-Side Protection - a successful defense against attacks requires securing both the client and server side of cloud computing.

Safeguards are in place to secure authentication, authorization, and other identity and access management functions. An organizational identification and authentication may not naturally extend into a public cloud. Identity federation allows the organization and cloud provider to trust and share digital identities and attributes across both domains.

Authentication - is the process of establishing confidence in user identities. Assurance levels should be appropriate for the sensitivity of the application and information assets accessed and the risk involved. Authorization is the process to control role definition, user authorization, and other administrative tasks related to security. Access controls - are one means to keep data away from unauthorized users; encryption is another. Access controls are typically identitybased, which makes authentication of the user s identity an important issue in cloud computing.

Multi-tenancy - High degrees of multitenancy over large numbers of platforms are needed for cloud computing to achieve the envisioned flexibility of on-demand provisioning of reliable services and the cost benefits and efficiencies due to economies of scale. Attack Vectors - multi-tenancy in virtual machine-based cloud infrastructures, together with the subtleties in the way physical resources are shared between guest virtual machines, can give rise to new sources of threat

Shared environment - Data stored in a public cloud typically resides in a shared environment collocated with data from other customers. Sensitive and regulated Organizations must account for the means by which access to the data is controlled and the data is kept secure. Data controls - Data must be secured while at rest, in transit, and in use, and access to the data must be controlled.

Data Sanitization - the data sanitization practices that a cloud provider implements have obvious implications for security. Sanitization involves the expunging of data from storage media by overwriting, degaussing, or other means, or the destruction of the media itself, to prevent unauthorized disclosure of information.

In simple terms, availability is the extent to which an organization s full set of computational resources is accessible and usable. Availability can be affected temporarily or permanently, and a loss can be partial or complete. Data Backup and Recovery - the organization s contingency and continuity planning should address the recovery and restoration of disrupted cloud services and operations, using alternate services, equipment, and locations.

Involves an organized method for dealing with the consequences of an attack against the security of a computer system. Incident Response Plan the cloud provider s role is vital in performing incident response activities, including incident verification, attack analysis, containment, data collection and preservation, problem remediation, and service restoration.

Trust requires a carefully execute service agreement. It should include everything that has been covered this morning. Have it reviewed by your Information Technology Department and legal counsel. Have these discussions with IT at the table. If you don t have an IT department? Hire a Technology Consultant to ensure all areas are covered and that you are protecting your agency.

Identify security, privacy, and other requirements for cloud services. Common security requirements include coverage for the following areas: Personnel requirements, including clearances, roles, and responsibilities Regulatory requirements Service availability Problem reporting, review, and resolution Information handling and disclosure agreements and procedures

Physical and logical access controls Network access control, connectivity, and filtering Data protection System configuration and patch management Backup and recovery Data retention and sanitization Security and vulnerability scanning Risk management Incident reporting, handling, and response Continuity of operations Resource management Certification and accreditation Assurance levels Independent auditing of services

NIST SP800-144 Guidelines on Security and Privacy in Public Cloud Computing http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Federal Risk and Authorization Management Program (FedRAMP) http://www.cio.gov/modules/fedramp/index.cfm Cloud Security Alliance https://cloudsecurityalliance.org/ NJINFOSECURE http://nj.gov/njinfosecure