Jericho Forum Report Back



Similar documents
Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration

IT Audit and Compliance

Fundamental Concepts and Models

Cloud Computing and Security Models: A Survey

A Comparison of IT Governance & Control Frameworks in Cloud Computing. Jack D. Becker ITDS Department, UNT & Elana Bailey

BYOD(evice) without BYOI(nsecurity)

Standard Information Communications Technology. Videoconferencing. January2013 Version 1.4. Department of Corporate and Information Services

Workprogramme 2013 objective 1.2. Sandro D Elia. Software & Service Architectures and Infrastructures

Sofware Engineering, Services and Cloud Computing

Auditing Cloud Computing. A Security and Privacy Guide. Wiley Corporate F&A

Parametric Analysis of Various Cloud Computing Security Models

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Security Architecture Principles A Brief Introduction. Mark Battersby , Oslo

How To Integrate Identity And Security With A Network-Based Business Process

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Cloud Security. Are you on the train or the tracks? ISSA CISO Executive Forum April 18, Brian Grayek CISSP, CCSK, ITILv3

Standard Information Communications Technology. Multifunction Device. January 2013 Version 2.2. Department of Corporate and Information Services

REVIEW ARTICLE. Received 21 February 2015 / Accepted 16 March INTRODUCTION

Client Security Risk Assessment Questionnaire

Address C-level Cybersecurity issues to enable and secure Digital transformation

Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer

Securing external suppliers and supply chains: the ISF approach

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Chapter 9 Firewalls and Intrusion Prevention Systems

H.I.P.A.A. Compliance Made Easy Products and Services

BEST PRACTICES FOR SECURE REMOTE ACCESS A GUIDE TO THE FUTURE

Lab Developing ACLs to Implement Firewall Rule Sets

ELECTRONIC COMMERCE WORKED EXAMPLES

System to System Interface Guide

Cybersecurity Strategic Consulting

Using SMI-S for Management Automation of StarWind iscsi SAN V8 beta in System Center Virtual Machine Manager 2012 R2

Using certificates as authentication method for VPN connections between Netgear ProSafe Routers and the ProSafe VPN Client

Secure Cloud Computing through IT Auditing

Security of Cloud Computing Providers Study

How to ensure control and security when moving to SaaS/cloud applications

The Best Security Solutions combine excellence in design, application and customer insight

Mobile Device Management

Survey Questionnaire for IT Applications. General instructions for filling the forms of survey questionnaire:

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson

Welcome to IBM SmartCloud Notes!

The Standard. of Good Practice. for Information Security

Network Security Guidelines. e-governance

The TCP/IP Reference Model

The Ethics of Cloud Computing A Conceptual Review

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN

How To Protect Your Cloud Computing Resources From Attack

Lesson s From the Granddaddy of Federation

BPO 2.0 Redefining The Very Basics of Business Process Outsourcing

Cloud Security. Let s Open the Box. Abu Shohel Ahmed ahmed.shohel@ericsson.com NomadicLab, Ericsson Research

Cloud Security Alliance: Industry Efforts to Secure Cloud Computing

Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0

Firewall Audit Techniques. K.S.Narayanan HCL Technologies Limited

Dispelling the Myths about Cloud Computing Security

UNCLASSIFIED CPA SECURITY CHARACTERISTIC REMOTE DESKTOP. Version 1.0. Crown Copyright 2011 All Rights Reserved

PROGRESS THROUGH PARTNERSHIP MAKING A DIFFERENCE GUIDANCE PERFORMANCE MANAGEMENT FRAMEWORK AND CONTINUOUS IMPROVEMENT

Configure ISE Version 1.4 Posture with Microsoft WSUS

The Comprehensive Guide to PCI Security Standards Compliance

Lab Configure IOS Firewall IDS

Networking Systems (10102)

Complying with PCI Data Security

Knowledgebase Solution

How To Make Money On Security For A Large Organization

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

IT Forum UW-Madison Records Management Program. UW Archives and Records Management

CloudDesk - Security in the Cloud INFORMATION

Security Technology: Firewalls and VPNs

A Secure and Open Solution for Seamless Transit Systems

APIs The Next Hacker Target Or a Business and Security Opportunity?

Empowering IT-as-a-Service with Cloud and OpenStack Technology Innovation

Lecture 02b Cloud Computing II

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Transcription:

Jericho Forum Report Back What's been achieved through 2009, and how we will continue to make a difference in 2010. Paul Simmonds & Adrian Seccombe Board of Management, Jericho Forum

How we got to here a brief review of the decade 2001 The de-perimeterisation word coined [Royal Mail s Jon Measham] 2002 Discussion started among like minded CISO s who saw the upcoming problem 2003 Paul Simmonds & David Lacey present at RSA Europe, caused front page headlines 2004 January: Jericho Forum founded at The Open Group Office in Reading interim board formed, and agree to Open Group taking over day-to-day running 2004 December: Interim board form as a Jericho Forum membership group, with an elected Board of Managers 2005 February: White paper published 2005 April: First Jericho Conference held alongside Info Security & SC Awards 2005 Interim board agree to Open Group to take over day-to-day running 2006 - Trade mark issued 2006 April: First position paper published 2006 April: Commandments published 2008 April: COA Published 2009 April: Cloud Paper Published 2009 De-perimeterisation an established concept, now accepted as relevant to the cloud 2009 Commandments seen to Stand up to the rigours of the Clouds In computing terms the Noughties was the decade of de-perimeterisation

Key Publications Business rationale for de-perimeterisation Jericho Forum Commandments White Paper Freely available at www.jerichoforum.org

Key Publications The need for Inherently Secure Protocols Collaboration Oriented Architectures Cloud Cube Freely available at www.jerichoforum.org

And it s not just us! Forrester Paul Stamp July 2005 ISSA Journal De-perimeterized Architecture The end to the edge August 2009 ISF Architectural Responses to the Disappearing Network Boundary February 2009

2009 & Up-coming work Self Assessment Scheme Cloud current work CSA memorandum of understanding Commandments still valid for cloud Identity & Access Management The cloud identity crisis - why cloud won't take off without Id & AM Risk based access

Self Assessment Scheme Rationale Based on the Commandments the set of nasty questions to ask your security vendors Check if they provide the security solutions you need and, Expose shortcomings in the features they may be claiming their offerings provide Can be used stand-alone, or relevant parts simply incorporated into an RFQ Release Timeline Beta Testing with vendors - Jan 2010 US Release, 1st March @ RSA Europe, 27 th April @ Info Security

From Connectivity to Collaboration Connectivity Full de-perimeterised working Today Effective Perimeter Breakdown Full Internet-based Collaboration Consumerisation [Cheap IP based devices] Limited Internet-based Collaboration External Working VPN based External collaboration [Private connections] Internet Connectivity Web, e-mail, Telnet, FTP Connectivity for Internet e-mail Connected LANs interoperating protocols Local Area Networks Islands by technology Stand-alone Computing [Mainframe, Mini, PC s] Time

Externalisation of Data Internal De-perimeterised COA Secured Cloud Old Data Then Data Now Data Near Future Data Future? Data The security of the network becomes increasingly irrelevant, and the security and integrity of the data becomes everything.

Jericho Forum Cloud Cube Model Dimension Four: Insourced / Outsourced The Cloud Location External Internal Perimeterised Proprietary Open Ownership - technology/services/code Architecture De-perimeterised

Cloud & the Cloud Cube model CSA memorandum of understanding Commandments still valid for the cloud Hybrid Computing will be the norm (A mix of traditional and various cloud computing) Private Clouds are Perimeterised Collaborative Clouds are best de-perimeterised Select the four types of either with care!

Identity & Access Management Key is to separate Identity Management from Access Management, and Audit the activities Identify: I am he/she! Authenticate: You are indeed! or not Access: I d like to do that Authorisation: Yes you are allowed or not Monitor: What did you do Audit: You did the right things, right! or not

The Cloud Identity Crisis The Cloud won't take off fully without appropriate Identity and Access Management Private Clouds will be able to take advantage of the old Perimeterised Identity and Access Management models Collaborative Clouds will need a significant shift from Enterprise Centric security to User Centric Security Clouds also will benefit greatly from the shift from Access by Lists to Access by Claims

Risk Based Access Current access methods Do not support business needs / granularity Do not support real cloud working Do not support the move the securing the data Trust but verify Basic trust models for devices & users exist But; How do you verify environments you do not own? How do you verify that environments you do not own are cleaned up after use?

2010 Planned / Proposed Work Publish Self Assessment Scheme for RSA Represent Jericho Forum thinking in 2010 RSA Conference Refine linkages to CSA and ENISA, and develop new linkages to other bodies (like ISSA) Identity and Access Management De-perimeterised wireless network implications

A reminder of how we work De-perimeterisation COA Cloud Few people 100% occupied More people, some vendors 60/40 split Thought Leaders Many people, users & vendors User Members Widest Jericho forum community and non-members Vendor Members IT / Business Leaders

Conclusions De-perimeterisation still a relevant topic with plenty to be highlighted and addressed Commandments are both relevant and still relevant as we move to cloud issues There is a shift from Enterprise Centric to User Centric IAM There needs to be a shift from ACL s to Claims based access

Questions & Comments omments Questions & Com Questions & Comments Questions & Comments ions & Comments

Shaping security for tomorrow s world www.jerichoforum.org