Cyber Security and Cloud Computing. Dr Daniel Prince Course Director MSc in Cyber Security d.prince@lancaster.ac.uk



Similar documents
Cloud Security Trust Cisco to Protect Your Data

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Cloud Security Introduction and Overview

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Security Who do you trust?

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

INFORMATION TECHNOLOGY SECURITY STANDARDS

Orchestrating the New Paradigm Cloud Assurance

Security in the Cloud: Visibility & Control of your Cloud Service Providers

Cloud Computing: Risks and Auditing

How To Protect Your Cloud Computing Resources From Attack

Managing Cloud Computing Risk

Cloud Computing Security Considerations

Threat Modeling Cloud Applications

Cloud Security Who do you trust?

Practical Overview on responsibilities of Data Protection Officers. Security measures

ENISA and Cloud Security

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Cyber Security - What Would a Breach Really Mean for your Business?

Cloud Computing: Legal Risks and Best Practices

Adopting Cloud Computing with a RISK Mitigation Strategy

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES

Cloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak

Embrace the G-Cloud. Ultra Secure Colocation Services for the Public Sector. thebunker.net Phone: Fax:

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Security Controls What Works. Southside Virginia Community College: Security Awareness

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Evaluating IaaS security risks

AskAvanade: Answering the Burning Questions around Cloud Computing

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

Cloud Security. DLT Solutions LLC June #DLTCloud

Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken )

External Supplier Control Requirements

How small and medium-sized enterprises can formulate an information security management system

NSW Government Digital Information Security Policy

Cloud computing and personal data protection. Gwendal LE GRAND Director of technology and innovation CNIL

Cloud Computing and Records Management

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

Information Security: Business Assurance Guidelines

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Cloud Security and Managing Use Risks

Security and Privacy in Cloud Computing J.M.Suri, DDG(I), TEC B.K.Nath, Dir(I), TEC

SECURE CLOUD COMPUTING

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

The NREN s core activities are in providing network and associated services to its user community that usually comprises:

Information Technology: This Year s Hot Issue - Cloud Computing

Whitepaper. What You Need to Know About Infrastructure as a Service (IaaS) Encryption

ISO27001 Controls and Objectives

CPNI VIEWPOINT 01/2010 CLOUD COMPUTING

COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'

Intel Enhanced Data Security Assessment Form

Caretower s SIEM Managed Security Services

Security and Privacy in Cloud Computing

Cloud Computing. What is Cloud Computing?

Executive Management of Information Security

How To Choose A Cloud Computing Solution

Cloud Computing: Contracting and Compliance Issues for In-House Counsel

Big Data, Big Risk, Big Rewards. Hussein Syed

Access Governance. Delivering value. What you gain. Putting a project back on track for success

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Leveraging the Private Cloud for Competitive Advantage

Mitigating and managing cyber risk: ten issues to consider

NSW Government. Cloud Services Policy and Guidelines

Cybersecurity in the States 2012: Priorities, Issues and Trends

What Cloud computing means in real life

Compliance Doesn t Mean Security Achieving Security and Compliance with the latest Regulations and Standards

Cloud Computing. Making legal aspects less cloudy. Erik Luysterborg Partner Cyber Security & Privacy Belgium EMEA Data Protection & Privacy Leader

A Guide to. Cloud Services for production workloads

Cloud Service Agreements: Avoiding the Pitfalls of the Cloud as a Commodity. Amy Mushahwar, Esq.

Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) 2014: 245 incidents reported

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

How to ensure control and security when moving to SaaS/cloud applications

Cloud Computing in a Regulated Environment

The problem of cloud data governance

Cloud security architecture

University of Sunderland Business Assurance Information Security Policy

IBM EXAM QUESTIONS & ANSWERS

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

Transcription:

Cyber Security and Cloud Computing Dr Daniel Prince Course Director MSc in Cyber Security d.prince@lancaster.ac.uk

Scope of Today SME Attractors for Cloud Switching to the Cloud Public Private Hybrid Big issues to consider Summary

SME Space 2.1m companies registered for VAT and or PAYE in March 2010 98% of these businesses have less than 50 employees Only 0.4% have more than 250 employee (Source: Office for National Statistics) Drivers Reduce expenditure on IT systems Maintain capabilities Flexibility to expand or reduce requirements Data sharing

SME Security View Lack in-house IT and infosec expertise Already used to outsourced IT service model Traditionally neglected by security vendors Few SMEs have any formal security policy Fewer have implemented ISMS or certification Mostly dependent on IT contractor advice. 66% of all security breaches occur within organisations with less 100 employees

Switch to Cloud Computing Considerations Security and Privacy Issues Public data Personal data (citizens sensitivities) Compliance Government security policies Legal requirements Need to protect assets to succeed Confidentiality, Integrity, Availability, Reputation Financial loss, loss of output, damage to reputation

Switch to Cloud Computing Compromise of personal data Damage to customers Damage to organisational reputation Information Security Management System (ISMS) ISO/IEC 27001:2005 ITIL Policies and procedures Legal and regulatory systems

Legislation affecting the Cloud Official Secrets Act 1989 Freedom of Information Act 2000 Data Protection Act 1998 Data Protection Act 1998 European Directive 95/46/EC European Convention on Human Rights Human Rights Act 1998 (www.arborcentre.co.uk)

Legislation affecting the Cloud Conflicting demands of privacy and freedom Use of meta data what to keep? Requires comprehensive procedures Storage Cataloguing Auditing Retrieval (www.staynalive.com)

Public Cloud Challenges Maintaining security and sovereignty Where are servers located? Data sovereignty which country is data in What security is in place? Data segregation in virtual environment Compliance with legal and government policies Audit and compliance Visibility of audit results and security logs Disaster recovery plans What business continuity is in place

Public Cloud Challenges Deletion of data Can all copies be removed? Standards for purging data/memory Risks from other customers business Attack against another customer could impact Highest customer security controls for all Maintaining compliance Span several jurisdictions Different legal requirements

Private Cloud Challenges Does not have security by default Policies and standards have to be applied Off Premise (3rd Party provider) Service Level Agreements (SLA s) required Vetting of staff Bearer bandwidth and availability On Premise Control of security management Maintaining compliance simpler

Hybrid Cloud Challenges All advantages/disadvantages of Public/Private Clouds Separate public/personal data Public non-sensitive data in Public Cloud Personal and sensitive data in Private Cloud Help to gain trust of citizens Maintaining compliance Need to maintain compliance of both Extra workload

Loss of Physical Control ENISA (2009) - non-cloud attack vectors translate with the same or a lower probability of occurrence in their cloud counterparts. HOWEVER, malicious insiders... Counter arguments cite information security standards (e.g., ISO27001), however, there remains a lack of clarity as to whom will be managing data.

Exposing Sensitive Data First, legal liability under current Data Protection Laws within the European Union? ENISA has advised public bodies in member states against using the cloud for anything other than non-sensitive and non-mission critical data. Second, what types of data can legally be stored in the cloud? Compliance requires proof of certain activities. PCI DSS requirement 10.2 for tracking and monitoring all access to network resources"

Exposing Sensitive Data Third, the transfer and storage of data in nondomestic and potentially unknown jurisdictions. EU Data Protection Directive -Data must be stored within the 27 member states or 3 of the EEA member countries, unless "sufficient" levels of protection can be proved. Review of 31 T&Cs found 15 to make no mention of data location or transit protection. Data Protection Laws between member states -the Directive may sometimes provide inadequate protection (e.g., Germany)!

Exposing Sensitive Data Cross-border movement of data and the impact of changing jurisdictions, associated legal obligations, and law enforcement practices (e.g., the USA's PATRIOT Act). Some T&Cs state the willingness to disclose data without court orders upon request from law-enforcement agencies, or if it's in the immediate "public interest".

Other Implications What are the implications of CSP acquisition or failure? Acquisition and the possibility of sudden changes in CSP policies and non-binding agreements? Review of 27 T&Cs found: 8 to mention no process for varying terms. 13 to state amendments could be posted on their website, and continued use is acceptance. Only 3 to state changes must be in writing with the agreement of both parties. Cloud-based IAM solution are comparatively inadequate to their non-cloud alternatives. Lack of widespread CSP support for open APIs and federation standards, e.g., SAML, XACML, and SPML.

Multi-tenancy First, negative consequences from co-tenant activities. Second, isolation failure through compromising the underlying privileged architecture. Third, there's a correlation between the increasing complexity of cloud offerings (especially inter-cloud), and the ambiguity over the division of security responsibilities between CSPs and their customers.

Take Away 1. Start by thinking about your information 2. What legal requirements cover you? 3. Think about Threat and Risk 4. Think about how you can get out of the Cloud cleanly 5. Scour the Terms and Conditions

Summary It's not just a new technology, but a new business model. Does the cloud provide a false sense of security? Why holding back: Risks not fully understood Lack of trust in security Lack of confidence in technology Risks to data security and privacy need to mature

CSC 2011