Compliance and the Cloud: What You Can and What You Can t Outsource



Similar documents
PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

Cloud Computing; What is it, How long has it been here, and Where is it going?

Managing Cloud Computing Risk

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Cloud Computing Technology

Cloud Services Overview

Platform as a Service and PCI

White Paper on CLOUD COMPUTING

Cloud Security Certification

Strategies for Secure Cloud Computing

The Elephant in the Room: What s the Buzz Around Cloud Computing?

Cloud Security. DLT Solutions LLC June #DLTCloud

Third Party Cloud Services Its Adoption in the New Age

Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?

Key Considerations of Regulatory Compliance in the Public Cloud

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Clinical Trials in the Cloud: A New Paradigm?

Cloud Computing What Auditors need to know

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Cloud for Credit Unions Leveraging New Solutions to Increase Efficiency & Reduce Costs Presented by: Hugh Smallwood, Chief Technology Officer

Cloud Computing Governance & Security. Security Risks in the Cloud

Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Healthcare Enterprise View of Cloud What is Cloud Additional Needs Cloud Models Cloud Economics 101 Stack Decision Framework

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

PCI DSS Overview. By Kishor Vaswani CEO, ControlCase

T2 IaaSand PCI Compliance. Robert Zigweid, IOActive

Information Technology: This Year s Hot Issue - Cloud Computing

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Cloud Computing. Chapter 1 Introducing Cloud Computing

With Eversync s cloud data tiering, the customer can tier data protection as follows:

Cloud Courses Description

Cloud models and compliance requirements which is right for you?

Cloud Security & Risk. Adam Cravedi, CISA Senior IT Auditor acravedi@compassitc.com

A Comparison of IT Governance & Control Frameworks in Cloud Computing. Jack D. Becker ITDS Department, UNT & Elana Bailey

Security & Trust in the Cloud

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors

Infrastructure as a Service (IaaS) Dancik International and Peak 10

Orchestrating the New Paradigm Cloud Assurance

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Navigating The World of Cloud Computing

PCI DSS. Payment Card Industry Data Security Standard.

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

Welcome. Panel. Cloud Computing New Challenges in Data Integrity and Security 13 November 2014

Cloud Computing: Background, Risks and Audit Recommendations

Cloud Card Compliance Checklist

Virtualization Impact on Compliance and Audit

Ensuring Cloud Security Using Cloud Control Matrix

Cloud Computing Trends, Examples & What s Ahead

Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Grid-Interop 2012

Security Issues in Cloud Computing

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

John Essner, CISO Office of Information Technology State of New Jersey

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012


A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

Securely Outsourcing to the Cloud: Five Key Questions to Ask

Strategies To Effective PCI Scoping ISACA Columbus Chapter Presentation October 2008

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

Cloud Computing. Chapter 1 Introducing Cloud Computing

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

CLOUD COMPUTING: WHAT YOU SHOULD KNOW

How to ensure control and security when moving to SaaS/cloud applications

Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

Demystifying the Cloud Computing

Cloud Computing in a Regulated Environment

What Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen

Oracle Applications and Cloud Computing - Future Direction

Information Security: Cloud Computing

PCI on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for PCI on AWS

Cloud Based Solutions for Media and Entertainment

Security Considerations for Public Mobile Cloud Computing

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

Connecting to the Cloud

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Cloud Computing. What is Cloud Computing?

INTRODUCING CLOUD POWER

Expert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II

ITIL in the Cloud. Vernon Lloyd.

How To Understand Cloud Computing

Abstract 1. INTRODUCTION

New Requirements for Security and Compliance Auditing in the Cloud

Cloud, Community and Collaboration Airline benefits of using the Amadeus community cloud

The PCI DSS Compliance Guide For Small Business

Transcription:

Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Kate Donofrio Security Assessor Fortrex Technologies

Instructor Biography Background On Fortrex What s In A Cloud? Pick A Cloud Draft NIST SP800-146 Considerations PCI DSS Scope PCI SSC Guidance Sample Cloud Provider Stances CSA Cloud Controls Matrix Outsource Considerations Agenda

Background on Fortrex General Facts IT Security, Operational Risk and Advisory Services Founded in 1997 Headquarters in Frederick, Maryland Privately Held Approaching 1,000 Customers Baltimore to Alaska to Guam Broad Industry Coverage QSA, PA-QSA & ASV Abundance of References Integrity, Excellence, Empowerment, Teamwork and Thankfulness

What s In A Cloud? NIST Special Publication 800-146 defines a cloud as a service which: o Maintains a pool of hardware resources to maximize service, minimize cost o Resource efficiency permits hardware refresh, migration of customer workloads

1950s Mainframes o Client/Server Model o Time-Sharing 1960s Pick A Cloud: History of the Cloud o Intergalatic Computer Network J.C.R Licklider ARPANET o Computation being delivered as a public utility John McCarthy - 1961 1999 Salesforce.com o Applications over the internet 2006 Amazon EC2 Rent technology 2009 Web 2.0 Browser based applications

Centralized or distributed Dedicated to single entity Pick A Cloud: Private Examples may include Data Warehouses or co-located cardholder data environments On-site Outsourced

Provide and/or subscribe o At least one participant must provide a service Pick A Cloud: Community May include one or many entities On-site Examples may include Wikipedia or SharePoint site structures Outsourced

Pick A Cloud: Public Potentially large computing and storage resources afford clients elasticity Communication links are generally provided over the public Internet Serves a diverse pool of clients Workload locations are hidden from clients Limited visibility and control over data security Public Examples may include Amazon or RackSpace

Pick A Cloud: Hybrid Composed of two or more private, community, and/or public clouds Uses may include Cloud bursting client employs private cloud and accesses one or more public clouds during periods of high demand May serve as backup resource o Disaster recovery Hybrid

Pick A Cloud: Environments Software as a Service (SaaS) Application access and use o Google, Twitter, Facebook Platform as a Service (PaaS) Access to tools and execution resources to develop, test, deploy and administer applications o Operating Systems, Network Access, Hosting, Database Management Infrastructure as a Service (IaaS) - Access to virtual computers, network-accessible storage, network infrastructure components such as firewalls, and configuration services

NIST SP800-140 Considerations Off-line Data Synchronization Interoperability Between Cloud Providers Compliance Physical Location Support for Forensics Information Security Responsibilities Data Privacy

PCI DSS Scope To confirm the accuracy and appropriateness of PCI DSS scope, perform the following: The assessed entity identifies and documents the existence of all cardholder data in their environment, to verify that no cardholder data exists outside of the currently defined cardholder data environment (CDE). Once all locations of cardholder data are identified and documented, the entity uses the results to verify that PCI DSS scope is appropriate (for example, the results may be a diagram or an inventory of cardholder data locations). The entity considers any cardholder data found to be in scope of the PCI DSS assessment and part of the CDE unless such data is deleted or migrated/consolidated into the currently defined CDE. The entity retains documentation that shows how PCI DSS scope was confirmed and the results, for assessor review and/or for reference during the next annual PCI SCC scope confirmation activity.

PCI SSC Guidance June 2011 PCI DSS Virtualization Guidelines state: Perform a detailed assessment of the unique risks associated with each service Hosted entity and provider clearly define and document the responsibilities assigned to each party for maintaining PCI DSS requirements and any other controls that could impact the security of cardholder data. Cloud provider should clearly identify which PCI DSS requirements, system components, and services are covered by the cloud provider s PCI DSS compliance program and which are responsibility of the hosted entity Cloud provider should provide sufficient evidence and assurance that all processes and components under their control are PCI DSS compliant

PCI SSC Guidance Define Responsibilities such as in the following example:

PCI SSC Guidance: Public Cloud Distributed architectures add layers of technology and complexity Designed to be public-facing, to allow access into the environment from anywhere on the Internet Infrastructures are by nature dynamic, and boundaries between tenant environments can be fluid Hosted entities have limited or no visibility into the underlying infrastructure and related security controls Hosted entities have limited or no oversight or control over cardholder data storage

PCI SSC Guidance: Public Cloud Hosted entities have no knowledge of who they are sharing resources with, or the potential risks their hosted neighbors may be introducing to the host system, data stores, or other resources shared across a multi-tenant environment Additional controls must be implemented to compensate for inherent risks and lack of visibility into architecture These challenges may make it impossible for some cloud-based services to operate in a PCI DSS compliant manner Evidence of cloud provider compliance should be subjected to rigorous review of controls

Sample Cloud Provider Stances: Amazon Is AWS now PCI certified? AWS provides a secure environment that has been validated by a QSA, allowing merchants to establish a secure cardholder environment and to achieve their own certification, having confidence that their underlying technology infrastructure is compliant. What does this mean to me as a PCI merchant or service provider? Our PCI Service Provider status means that customers who use our services to store, process or transmit cardholder data can rely on our PCI compliance validation for the technology infrastructure as they manage their own compliance and certification, including PCI audits and responses to incidents. Our service provider compliance covers all requirements as defined by PCI DSS for physical infrastructure service providers.

Sample Cloud Provider Stances: Amazon Does the PCI standard require single-tenant environments in order to be compliant? No. The AWS environment is a virtualized, multi-tenant environment. AWS has effectively implemented security management processes, PCI controls, and other compensating controls that effectively and securely segregate each customer into its own protected environment. Do QSAs for Level 1 merchants require a physical walkthrough of a service provider s data center? No. A merchant can obtain certification without a physical walkthrough of a service provider s data center if the service provider is a Level 1 validated service provider (such as AWS). A merchant s QSA can rely on the work performed by our QSA, which included an extensive review of the physical security of our data centers.

Sample Cloud Provider Stances: RackSpace How do you handle payment for Cloud Sites? Cloud Sites is a multi-tenant hosted environment. The Payment Card Industry prohibits handling or maintaining credit card information in multi-tenant environments. Thus, all credit card processing must be handled completely by a third party payment gateway. Building an e-commerce solution using Cloud Sites Cloud Sites is designed to provide an elastic web-hosting environment. This capability can allow an e-commerce merchant to properly handle the high-volume shopping season without carrying extra infrastructure throughout the remainder of the year. Cloud Sites is not currently designed for the storage or archival of any credit card related information, all credit card information must be handled on the payment gateway.

Sample Cloud Provider Stances: RackSpace Rackspace understands that organizations have different needs and requirements, especially when it comes to critical IT infrastructure. In support of this, Rackspace offers a portfolio of Private Cloud solutions.

Cloud Security Alliance Cloud Security Matrix The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. The Cloud Security Alliance Cloud Controls Matrix (CCM) provides a controls framework in 13 domains aligned with industry-accepted security standards, regulations, and controls frameworks such as: ISO 27001/27002 ISACA COBIT PCI DSS NIST BITS GAPP HIPAA/HITECH Jericho Forum NERC CIP

Cloud Security Alliance Cloud Security Matrix CCM domains include: Compliance Data Governance Facility Security Human Resource Security Information Security Legal Operations Management Risk Management Release Management Resiliency Security Architecture

Outsource Considerations What do you really need? What are you really getting? Do standards, regulatory, or framework compliance requirements impact planned service/system? Is the platform single or multi-tenant? Is the selected platform truly scalable?

Outsource Considerations What boundary controls are established? What security controls are enforced? How are information security responsibilities allocated? Does the provider support forensics? Where are utilized data center facilities? Are they accessible?

Questions?

Thank You.