GSA Cloud Security Case Study



Similar documents
Platform Leadership in Software as a Service: How Platforms Facilitate Innovation

Cloud Security for Federal Agencies

Seeing Though the Clouds

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Report: Salesforce and Microsoft Dynamics CRM Outlook Integration Compared

John Essner, CISO Office of Information Technology State of New Jersey

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services

DoD Cloud Computing Security Requirements Guide (SRG) Overview

Cloud-Security: Show-Stopper or Enabling Technology?

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Secure Cloud Computing

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Cybersecurity Health Check At A Glance

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.

Cloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs

White Paper How Noah Mobile uses Microsoft Azure Core Services

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Federal Risk and Authorization Management Program (FedRAMP)

Service Models. Chapter Three

Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses

FISMA Cloud GovDataHosting Service Portfolio

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

Attacks from the Inside

FedRAMP Standard Contract Language


GoodData Corporation Security White Paper

Quick guide: Using the Cloud to support your business

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Google Apps Premier Edition. Included Yes Yes Yes Storage 25 GB Varies by deployment

CHAPTER 8 CLOUD COMPUTING

THE COMPLETE GUIDE TO GOOGLE APPS SECURITY. Building a comprehensive Google Apps security plan

Security Issues in Cloud Computing

How To Protect A Virtual Desktop From Attack

Protect Web Sites from Cyber Attacks

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

Whitepaper: Cloud Computing for Credit Unions

Symantec Enterprise Vault.cloud Giovanni Alberici

IT-CNP, Inc. Capability Statement

elivering CRM Success in the Cloud

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

SERENA SOFTWARE Serena Service Manager Security

Salesforce & HIPAA Compliance

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

Report of Evaluation OFFICE OF INSPECTOR GENERAL. OIG 2014 Evaluation of the Farm Credit OIG 2014 Administration s. Management Act.

Think like an MBA not a CISSP

Security Considerations for Public Mobile Cloud Computing

Addressing Cloud Computing Security Considerations

IBM Security in the Cloud

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Sophos Mobile Control

Esri Managed Cloud Services and FedRAMP

G-Cloud II Services Service Definition Accenture Cloud SaaS Implementation Services Google Apps

Why can you trust Google?

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Technologize Your Business

Google Apps Overview

Salesforce Automation

Cloud Security:Threats & Mitgations

Integrating Single Sign-on Across the Cloud By David Strom

Transparency. Privacy. Compliance. Security. What does privacy at Microsoft mean? Are you using my data to build advertising products?

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

FY15 Quarter 1 Chief Information Officer Federal Information Security Management Act Reporting Metrics V1.0

Cloud Security. DLT Solutions LLC June #DLTCloud

Critical Controls for Cyber Security.

Kent State University s Cloud Strategy

Security Issues In Cloud Computing And Their Solutions

How To Secure Your Employees Online With Zscaler.Com And Your Website From Being Infected With Spyware Or Malware

Click to edit Master title style

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

United States Department of Agriculture. Office of Inspector General

Kaspersky Security for Mobile

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

Defending Against Data Beaches: Internal Controls for Cybersecurity

BYOD: End-to-End Security

MOVING SECURITY TO THE CLOUD. pandasecurity.com

Microsoft Azure. Microsoft Azure Security, Privacy, & Compliance

Transcription:

GSA Cloud Security Case Study Kurt Garbars Certified Information Systems Security Professional Senior Agency Information Security Officer General Services Administration June 13, 2012

Topics Purpose Reason for moving to the cloud Byproduct of moving to the cloud Google Mail Salesforce.com Fiberlink (MaaS 360) Cloud ATOs Key to successful cloud security ATO 2

Topics (cont) Google security differentiators Salesforce security differentiators Fiberlink security differentiators Cloud security threats Cloud security challenges GSA cloud security best practices Lessons Learned 3

Purpose Provide overview of 'S! s accomplishments and security challenges in implementing 3 cloud based services (i.e. SaaS) for 17,000 users Google Salesforce.com Fiberlink 4

Reason for moving to cloud Aging Infrastructure Lotus Notes, Lotus Domino, Sametime and Quickr Agility Expensive to maintain Ability to quickly add functionality For all 3 services Cost Savings $3M/year for email/collaboration $200K/year for Fiberlink MaaS360 power management 5

Byproduct of moving to the cloud Increased security 6

Google Google Apps Cloud Core Applications Available in Google Apps Cloud ATO Scope Available in Google Apps for Government and CONUS Gmail Google Calendar Google Drive (Documents, Spreadsheets, and Presentations) Google Talk Google Contacts Google Groups Google Sites Google Video 7

Salesforce Salesforce.com Applications Force.com Platform CRM Applications (including Sales Cloud, Service Clould, Custom Cloud, Content, Ideas, Knowledge, and Answers) Chatter Force.com Platform Public Sites Service Cloud Portal, Customer Portal, Partner Portal Authenticated Sites Sites.com Visualforce coding Available in CONUS 8

Fiberlink MaaS 360 Power Management Monitoring security status of workstations/servers Mobile device management for smart phones/tablets Cyberscope reporting Application inventory for all assets 9

Cloud ATOs GSA began discussions with a few cloud providers in June 2009 Based on cloud initiative by Federal CIO Precursor to FedRAMP Used GSA security requirements based on NIST 800-53 R3 Cloud providers hired independent assessors with GSA oversight Google was the first to obtain ATO in July 2010!TOs maintained in 'S! s &ISM! inventory; working on FedRAMP ATOs can be leveraged government-wide Agencies still need to perform assessment on agency responsible controls and provide final ATO 10

Key to successful cloud security ATO Thorough understanding/agreement on the boundary of the cloud/scope of the assessment Understand the inherited controls Understand the vendor versus agency security control responsibilities Understand the security control touch points (those controls that have a shared responsibility) Agree upfront on all NIST 800-53 parameters, alternate implementations, key controls, and show stoppers 11

Google Security Differentiators Configuration management Vulnerability management Source code scanning 'oogle for 'overnment cages Full Disk Encryption (GAfG) Anti-malware and spam filtering capability System availability (COOP) 12

Salesforce.com Security Differentiators Apex programming language Source code scanning of all apps Configuration Management Agile Application development with like security Common development practices for entire agency Individual assessments of minor applications Weekly scans of the Application environments 13

Fiberlink Security Differentiators Monitor workstations, servers for security settings Control workstations, servers for security settings Patching Security Hardening USGCB compliance (i.e. old FDCC) & Cyberscope Quickly add security functionality for agencies Mobile device management for smartphones/tablets Perform above functions to multiple devices in any Internet connected location 14

Cloud Security Threats End user information sharing to unauthorized users APT attacks on agency admins/agency end users APT attacks on vendor admins Insider threat (vendor) Web site attacks on insecure code 15

Cloud Security Challenges Vendors not familiar with government security requirements Qualified assessors with cloud security expertise Environments that are continuously changing Vendors did not design system IAW NIST 800-53 security requirements Transparency Background investigations Location of datacenters 16

Cloud Security Challenges (cont) Auditing/Logging Continuous monitoring Trusted Internet Connection Direct HSPD-12 authentication 2-factor authentication of vendor personnel Data leakage prevention Custom/specialized environments; requires atypical assessment models 17

GSA Cloud Security Best Practices Layered security authorizations for Salesforce apps Platform/Gov-wide, Agency/Org, Application Efficient Salesforce apps ATO process to include security code scanning Upfront background investigation process Information sharing process Isolation of admin access Maintain internal control of 2 factor authentication 18

Lessons Learned Need stronger contract clauses related to security Incentives/Penalties FISMA Cyberscope Auditing/Logging Background investigations Continuous monitoring Better process for security reviews before upgrades/enhancements 19

Questions 20