Key Considerations of Regulatory Compliance in the Public Cloud



Similar documents
Orchestrating the New Paradigm Cloud Assurance

On Premise Vs Cloud: Selection Approach & Implementation Strategies

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

Cloud Security and Managing Use Risks

Cloud Security Panel: Real World GRC Experiences. ISACA Atlanta s 2013 Annual Geek Week

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Security Issues in Cloud Computing

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Managing Cloud Computing Risk

Cloud Computing; What is it, How long has it been here, and Where is it going?

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

Information Technology: This Year s Hot Issue - Cloud Computing

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Cloud Services Overview

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Cloud Courses Description

How To Manage Cloud Data Safely

Cloud Security. DLT Solutions LLC June #DLTCloud

Cloud Computing: Background, Risks and Audit Recommendations

Cloud Courses Description

Cloud Computing: Compliance and Client Expectations

Clo l ud d C ompu p tin i g

Security & Trust in the Cloud

LEGAL ISSUES IN CLOUD COMPUTING

The Elephant in the Room: What s the Buzz Around Cloud Computing?

Auditing Cloud Computing and Outsourced Operations

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

Compliance and the Cloud: What You Can and What You Can t Outsource

Tips For Buying Cloud Infrastructure

About the Presenter About the Cloud Security Alliance Guidance 1.0 Getting Involved Call to Action

Big Data, Big Risk, Big Rewards. Hussein Syed

Allison Stanton Director of E-Discovery U.S. Department of Justice, Civil Division

CLOUD COMPUTING LESSONS LEARNED. Marc Vael, Chief Audit Executive Smals / President ISACA Belgium, November 2015

SECURITY AND EXTERNAL SERVICE PROVIDERS

What Cloud computing means in real life

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Cloud Computing. Bringing the Cloud into Focus

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region

Cloud Business Value. Francis Magann Senior Customer Solutions Architect. 20 th April 2011

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

How to ensure control and security when moving to SaaS/cloud applications

Cloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com

Assessing Risks in the Cloud

CONTROLLING CLOUDS: BEYOND SAFETY

BUSINESS MANAGEMENT SUPPORT

Services Providers. Ivan Soto

Cloud Security Introduction and Overview

The Push and Pull of the Cloud. TPI Cloud Computing Overview. April 5 th 2011


Cloud Security Who do you trust?

Certified Information Systems Auditor (CISA)

Dispelling the Myths about Cloud Computing Security

Konsolidacija podatkov v oblaku znotraj organizacije

Healthcare Data in the Cloud A Gathering Storm of Governance. Erik Pupo Senior Manager, Deloitte

Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World

What Every User Needs To Know Before Moving To The Cloud. LawyerDoneDeal Corp.

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

The Cloud at 30,000 feet. Art Ridgway Scripps Media Inc. Managing Director Newspaper IT Operations

John Essner, CISO Office of Information Technology State of New Jersey

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud

Deploying a Geospatial Cloud

6 Cloud computing overview

Working Group on. First Working Group Meeting

Technical Benefits of Cloud-based Contact Centers The Advantages of the Model

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit

Clinical Trials in the Cloud: A New Paradigm?

The Keys to the Cloud: The Essentials of Cloud Contracting

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.

A Comparison of IT Governance & Control Frameworks in Cloud Computing. Jack D. Becker ITDS Department, UNT & Elana Bailey

Cloud Computing Security Issues

Cloud models and compliance requirements which is right for you?

Cloud Computing Readiness - Background

How To Make Money From Cloud Computing

Adopting Cloud Computing with a RISK Mitigation Strategy

How To Operate In Cloud

Cloud Computing What Auditors need to know

Architecting the Cloud

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

AHLA. JJ. Keeping Your Cloud Services Provider from Raining on Your Parade. Jean Hess Manager HORNE LLP Ridgeland, MS

CLOUD COMPUTING DEMYSTIFIED

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate.

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Cloud Security & Risk. Adam Cravedi, CISA Senior IT Auditor acravedi@compassitc.com

Cloud and Regulations: A match made in heaven, or the worst blind date ever?

Cloud Computing Standards: Overview and ITU-T positioning

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects

How To Protect Your Cloud Computing Resources From Attack

Top 10 Cloud Risks That Will Keep You Awake at Night

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?

Cloud Computing in a Regulated Environment

Secure Enterprise Mobility Management. Cloud-Based Enterprise Mobility Management. White Paper: soti.net

SECURING HEALTH INFORMATION IN THE CLOUD. Feisal Nanji, Executive Director, Techumen

Transcription:

Key Considerations of Regulatory Compliance in the Public Cloud W. Noel Haskins-Hafer CRMA, CISA, CISM, CFE, CGEIT, CRISC 10 April, 2013 w_haskins-hafer@intuit.com Disclaimer Unless otherwise specified, the views expressed in this presentation are my own, and not those of any other individual or individuals connected with my current or former employers. All names, logos, and other outside material attributed to other sources remains the property of their respective copyright owners and are used here in accordance with the Fair Use doctrine. 2 1

Agenda Speaker Qualifications Setting the Stage The Regulatory Environment Considerations for Compliance in the Cloud Speaker Qualifications Compliance Program Manager for Intuit Financial Services Product Development Formerly with Intuit s Computer Information Security and Internal Audit Teams Manager, Enterprise Risk Services (Deloitte & Touche, LLP) Member of BITS Cloud Computing and Data Governance SIGs Charter member of CSA s Financial Services SIG ISACA-SD CGEIT and CRISC Coordinator ISACA International s review committee member for certification study materials and COBIT 5 framework 2

The Challenge Regulatory Environment Business Cloud Computing Many Industries are Regulated 3

Most Participants are also Businesses Accounting Finance Human Resources Information Technology Service Delivery Legal Sales and Marketing A Typical Simplified Supply Chain Partners Business Customers Customer End Users Suppliers Company Partner Other 3 rd Parties Direct End Users 4

Common Goals for the Cloud Simplify IT operations Infrastructure, platform and software Increase agility Save money Transfer capex to opex Improve global operations service delivery Focus on core business All While Maintaining Legal & Regulatory Compliance The NIST Cloud Definition Framework Deployment Models Private Cloud Hybrid Clouds Community Cloud Public Cloud Service Models Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Essential Characteristics On Demand Self-Service Broad Network Access Rapid Elasticity Resource Pooling Measured Service Common Characteristics Massive Scale Homogeneity Virtualization Low Cost Software Resilient Computing Geographic Distribution Service Orientation Advanced Security From NIST s Effectively and Securely Using the Cloud Computing Paradigm (Presentation Oct 7, 2009) 10 5

The Essence of Cloud Computing Cloud computing is about gracefully losing control while maintaining accountability even if the operational responsibility falls upon one or more third parties. Cloud Security Alliance (CSA) Security Guidance for Critical Areas of Focus in Cloud Computing V21, Dec 2009 11 Accountability in the Cloud Is... Customer satisfaction Data integrity and reliability Increased partnership throughout the supply chain Inherited 3 rd party controls over operations Lower visibility into operations Regulatory compliance 6

Let s Keep Things Simple Banking Industry in 2013 Evolving and uncertain regulatory environment Continued focus on risk management Including infrastructure and risk strategy Expansion of products and services Expense management and restructuring Security and privacy risks Data integrity and data management Protiviti FS Insights, February 2013 7

Banking Adoption of the Cloud Back-office functions IaaS Archive and Disaster Recovery IT Management Security as a Service PaaS Application development and testing Web Server SaaS Analytics Customer Relationship Management Collaboration within the business Very little core business adoption Regs and Laws and Standards, Oh My! FFIEC Federal Reserve Office of the Comptroller of the Currency National Credit Union Association Federal Deposit Insurance Corporation Consumer Financial Protection Board State Banking Regulators Federal Credit Reporting Agency Federal Trade Commission 8

But Wait There s More! Graham-Leach-Bliley Act US Patriot Act Bank Secrecy Act Bank Service Company Act Sarbanes-Oxley Act Fair and Accurate Credit Transactions Act Foreign Account Tax Compliance Act Americans with Disability Act Payment Card Industry Data Security Standard And even more if you re doing business internationally Let s Not Forget Company policies Operating principles Covenants and other company legal obligations Existing contracts with 3 rd Parties 9

Add It All Together And What To Do? Don t Panic! 10

Stop, Think and Plan Identify the end goal Focus on what changes Follow a methodical process to Understand the complexity of the environment Analyze and assess inherent risks Know who s responsible for what Develop an approach to address and manage risks Collaborate with SMEs Internal and external (Cloud Service Provider (CSP) and other 3 rd parties) What Regulators Want Assurance that management has identified, assessed, evaluated and addressed risks throughout the supply chain and that data is appropriately safeguarded It s Still About Risk Management 11

What Stays the Same What the customer sees and does The need to safeguard customer and enduser data Most of the internal business structure FFIEC Guidance What Changes Technical architecture Applications Data Security Network Identity management Data Governance Reliance on 3 rd Parties 12

Technical Architecture Application independence from infrastructure Asset management Infrastructure component ownership Virtualization Server maintenance / patching Who, what, and when Configuration management and drift Information Supplement PCI CSS Cloud Computing Guidelines (Feb 2013) 13

Information Supplement PCI CSS Cloud Computing Guidelines (Feb 2013) 14

Additional Security Challenges Encryption and tokenization Key management Application security Network segmentation and traffic isolation Data flows between internal and public networks Operational and control responsibilities Authentication Information Supplement: PCI DSS Cloud Computing Guidelines Feb 2013 15

Identity and Access Management End users Customers Product administrators Internal employees Cloud employees CSP administrators 16

Data Governance Considerations Suitability for the cloud Classification and characteristics Location Usage rights Cloud exit strategy Retention and destruction Suitability for the Cloud Type of application and transactions Type of data Legal requirements Street value of data 17

Data Classification and Characteristics Taxonomy Data element dependencies Data architecture and model Volume Data life cycle Data roles Stewardship Ownership Custodian Data Location Geographic location Processing Storage Backups Recovery Transmission path Segregation from CSP s other clients data Segregation of transaction processing Segmentation and partitioning 18

Data Usage and Exit Strategy CSP data usage rights Investigation practices Forensics Legal investigations Incident management response and processes Data exit strategy End of contract Cancellation of contract Data Retention and Destruction Retention period and formats Return mechanisms and formats Disposal Erasure / destruction of all copies 19

CSP and 3 rd Party Considerations Viability and reliability Lock-in Transparency Technical capability Capacity and storage Processing power Latency CSP s downstream third parties CSP Considerations, continued Cloud management and integration Interoperability of enterprise and CSP tools Maintenance schedules Sufficient data and reporting to manage and monitor enterprise business End-to-end incident response and management Audits 20

CSP Considerations, continued Privacy principles and data protection expectations Security measures and responsibilities Cloud asset and resource ownership Jurisdiction and legal compliance Data movement and data storage Service Level Agreements Recovery objectives and priorities Acceptable actions to take for nonperformance Challenges Beyond CSP Software licensing Terms relative to the cloud License pricing By seat Peak vs non-peak usage Growth projections and pricing International restrictions User control considerations Separation of monitoring and application functions 21

It s More than IT Governance Governance and Enterprise Risk Management Third Party Management Legal and Electronic Discovery Compliance and Audit Information Lifecycle Management Portability and Interoperability Operational Traditional Security, BCP & DR Data Center Operations Incident Management Application Security Encryption and Key Management Identity and Access Management Virtualization Adapted from Cloud Security Alliance (CSA) Security Guidance for Critical Areas of Focus in Cloud Computing V21, Dec 2009 43 Meeting the Cloud Challenge Understand Relevant regulations and laws The end-to-end supply chain Role and position within the supply chain CSP roles and responsibilities Security boundaries and responsibilities Data characteristics and value Focus on the governance goal Plan and manage the risks throughout the supply chain 22

Questions, Answers & Discussions APPENDIX 23

Resources IDC Financial Insights: Best Practices: Cloud Vendors and Banking Making Contracts Work (Jeanne Capachin, Marc DeCastro, Michael Versace, February 2013) Effectively and Securely Using the Cloud Computing Paradigm (NIST Presentation, October 7, 2009) Information Supplement: PCI DSS Cloud Computing Guidelines (PCI Security Standards Council, February 2013) Security Guidance for Critical Areas of Focus in Cloud Computing V21 (Cloud Security Alliance (CSA), December 2009) Securing Capabilities in the Cloud: Security and Privacy in the Evolution of Cloud Computing (Deloitte & Touche, LLC Webinar, June 2, 2011) FS Insights (Protiviti, February 2013) FFIEC IT Handbooks Audit Business Continuity Planning Development and Acquisition E-Banking Information Security IT Management Operations Supervision of Technology Service Providers (3 rd Party Management/Outsourcing) Retail and Wholesale Payment Systems 24

FFIEC Document Request Letter Contents Financial Information Business and Technology Environment Hardware, Software, Network Internal and External Audit IT Management Development and Acquisition SDLC, Customer Support, User Groups, Customer base Support and Delivery Performance and Security Monitoring, DRP, Physical Security 25