Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD



Similar documents
Cloud Computing Technology

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Cloud Computing; What is it, How long has it been here, and Where is it going?

Security & Trust in the Cloud

NCTA Cloud Architecture

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

With Eversync s cloud data tiering, the customer can tier data protection as follows:

What Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen

Cloud Computing. Chapter 1 Introducing Cloud Computing

Security Issues in Cloud Computing

Electronic Records Storage Options and Overview

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

About me & Submission details

Cloud Services Overview

CHAPTER 8 CLOUD COMPUTING

Cloud Computing. Chapter 1 Introducing Cloud Computing

White Paper on CLOUD COMPUTING


What is Cloud Computing? Tackling the Challenges of Big Data. Tackling The Challenges of Big Data. Matei Zaharia. Matei Zaharia. Big Data Collection

Cloud Computing An Elephant In The Dark

Cloud Computing Benefits for Educational Institutions

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Cloud models and compliance requirements which is right for you?

Cloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com

Architectural Implications of Cloud Computing

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Quick guide: Using the Cloud to support your business

Digital Forensics for IaaS Cloud Computing

Cloud Courses Description

Cloud Computing. What is Cloud Computing?

Hybrid Cloud Identity and Access Management Challenges

Oracle Applications and Cloud Computing - Future Direction

Security Considerations for Public Mobile Cloud Computing

Orchestrating the New Paradigm Cloud Assurance

Cloud Courses Description

Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro

Information Technology: This Year s Hot Issue - Cloud Computing

Secure Cloud Computing through IT Auditing

An Introduction to Cloud Computing Concepts

Welcome. Panel. Cloud Computing New Challenges in Data Integrity and Security 13 November 2014

Cloud Computing An Auditor s Perspective

Cloud Computing and HIPAA Privacy and Security

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

Cloud Computing. Chapter 1 Introducing Cloud Computing

Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS

How cloud computing can transform your business landscape

CLOUD TECHNOLOGY IMPLEMENTATION/SECURITY

Clinical Trials in the Cloud: A New Paradigm?

Cloud Computing: The Next Computing Paradigm

1 The intersection of IAM and the cloud

CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013

Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013

Deploying a Geospatial Cloud

OTM in the Cloud. Ryan Haney

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages

Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1

Service Models. Chapter Three

What Factors Determine Cloud Computing Adoption by Colleges and Universities? Bill Klug Instructor, BCIT

How To Compare Cloud Computing To Cloud Platforms And Cloud Computing

The Cloud. JL Cabrera LTEC 4550

SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS

Evaluating the Cloud An Executive Perspective

Bringing the Cloud into Focus. A Whitepaper by CMIT Solutions and Cadence Management Advisors

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit

Cloud Computing: Contracting and Compliance Issues for In-House Counsel

Virtualization and Cloud Computing

The Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management

Security and Privacy in Cloud Computing

What Is It? Business Architecture Research Challenges Bibliography. Cloud Computing. Research Challenges Overview. Carlos Eduardo Moreira dos Santos

Cloud Platforms in the Enterprise

Kent State University s Cloud Strategy

Cloud Computing Security Issues

ArcGIS for Server: In the Cloud

Addressing Data Security Challenges in the Cloud

CLOUD COMPUTING INTRODUCTION HISTORY

Cloud Computing-A Tool For Future

Abstract 1. INTRODUCTION

Hosting Services VITA Contract VA AISN (Statewide contract available to any public entity in the Commonwealth)

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

Transcription:

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Agenda Cloud Computing Technical Overview Cloud Related Applications Identified Risks Assessment Criteria

Cloud Computing What Is It? National Institute of Standards and Technology (NIST): Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models. 1 1. Mell, Peter and Tim Grance. The NIST Definition of Cloud Computing The National Institute of Standards and Technology. September 2011. http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf

Five Characteristics On-Demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service

Three Service Models Software as a Service (SaaS) - Applications hosted by an outside party and accessed via the internet. Avoids the need for complex in-house software installation and management. Examples: Salesforce.com Infrastructure as a Service (IaaS) Resources owned by an outside party and used on a contractual basis.(storage, servers, etc.) Examples: Amazon Elastic Cloud (EC2), Amazon Simple Storage Service (S3), and Rackspace. Platform as a Service (PaaS) - Platforms provided by an outside party used for building/running applications. Overlaps with SaaS. Example: Google App Engine

Other Service Models Network as a Service (NaaS) Storage as a Service (SaaS) Security as a Service (SECaaS) Data Base as a Service (DBaaS) Data as a Service (DaaS)

Four Deployment Models Public - Services offered to anyone regardless of affiliation. All users share the same resources. Community Cloud infrastructure is provisioned for use by organizations with similar interests. Private - Services and resources are supplied by and/or to only a select group like a private company, University, etc. Hybrid - Using a public cloud provider to build a private cloud. This may also include connections from the cloud resources to the local or other remote resources. Some companies may desire a private cloud but prefer that it s hosted off site.

Advantages Elasticity of Computing Resources Economy Easy Collaboration Levels Playing Field Reliability Disaster Recovery

Disadvantages / Concerns/ (Risks?) Security and Privacy Availability/Reliability Data Ownership Performance Data Leakage To Public Clouds

Cloud Example: Amazon Growth AMAZON in 2003 = $5B revenue business Every day they are adding enough new server capacity to handle all of Amazon globally when they were a $5Billion dollar company in 2003. Amazon Web Services (AWS) Physical Locations Regions - physical places in the world where they have infrastructure and data centers they call "Availability Zones (25). 9 Regions: 1 East Coast U.S., 2 West Coast U.S., 1 Europe, 1 Singapore, 1 Tokyo, 1 Brazil, 1 Australia, 1 U.S. Government only cloud called "GovCloud".

Cloud Example: Amazon (cont.) Amazon EC2 Elastic Compute Cloud IaaS Amazon S3 Simple Storage Service SaaS Storage as a Service Used by Dropbox, Tumblr, Pinterest Amazon Redshift Big Data DBaaS

Cloud Example: Windows Azure Infrastructure, Web, Mobile, Big Data, Development and Testing, Identity/Access Management, Media, Storage/Backup/Recovery PaaS Web Sites, Hosted Applications IaaS Virtual machines, Compliance HIPAA SSAE 16/ISAE 3402 Attestation - control objectives are appropriately designed and that the controls safeguarding customer data are operating effectively

Why Now? Bandwidth Increases Virtualization Mobile Devices: Smart Phones, Tablets Cheap Storage HTML 5

Patchy Clouds With a Chance of Rain Governance Contracts and Service Level Agreements are in place Compliance with Regulatory Standards Vendor Management Risk Assessment Details specified in contract and Service Level Agreements Business Process Financial and Operational Technical Security and Privacy

Campus Cloud Related Applications Private Cloud Activity Storage San Diego Super Computer (SDSC) Infrastructure Virtual Machine Hosting (SDSC) Integrated Financial Information System (IFIS) Personnel Payroll System (PPS) Public Cloud Activity (Hosted Solutions) MarketPlace (SciQuest) Google Apps Possible Future Agreements Microsoft Azure 365

Assessment Criteria Type of Data to Store PII, PHI, Personal or Financial Information, Academic Records, Human Subjects/Research Data, other sensitive data US Location only? Data Retention and Destruction Hardware Dedicated or Shared? Is data subject to retention or destruction requirements? Grant Requirements Local Policy Requirements Encryption Methods Security and Privacy Is data encrypted in transit? At rest? How is authentication and access secured? SSL?

Assessment Criteria (cont.) Business Continuity Large or frequent data uploads/ downloads? Latency tolerance? Disaster Recovery Redundancy Amazon Web Services -April 2011, the company s data center in Virginia suffered from a devastating bout of issues regarding connectivity and latency. Contract Clause Audit Clause? Has anything been agreed to that cannot be undone? Breach Notification Does the contract support IS-3 Third Party Agreements for breach notification? UC Cost Does the service provide comparable or enhanced service at a reduced cost? Is there a system wide agreement already in place?

Resources Recent Advances Delivered by HTML 5 in Mobile Cloud Computing Applications: A Survey http://dl.acm.org/ft_gateway.cfm?id=2371355&ftid=1290956&dwn=1&cfid=240121200&cftoken=68253 737 Campus Agreements http://www.ucop.edu/purchserv/psa_db/pubregisterindex.php?mode=1&id=37 HIPAA/HITECH http://www.hhs.gov/ocr/privacy/hipaa/administrative/enforcementrule/hitechenforcementifr.html Vendor Resources Windows Azure Compliance: http://www.windowsazure.com/en-us/support/trust-center/compliance/ Windows Azure HIPAA Implementation Guidance: http://download.microsoft.com/download/8/4/8/8483b6a9-1865-4d17-b6f1-5b66d5c29b10/windows%20azure%20hipaa%20implementation%20guidance.pdf Amazon Compliance http://aws.amazon.com/compliance/ Dropbox Compliance https://www.dropbox.com/help/238/en Dropbox Privacy https://www.dropbox.com/privacy jemcdonald@ucsd.edu dkinser@ucsd.edu