Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer



Similar documents
Cloud Computing Security Issues

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro

LEGAL ISSUES IN CLOUD COMPUTING

Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

IS PRIVATE CLOUD A UNICORN?

6 Cloud computing overview


East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit

CLOUD IN HEALTHCARE EXECUTIVE SUMMARY 1/21/15

NCTA Cloud Architecture

Cloud Security and Managing Use Risks

Private Cloud 201 How to Build a Private Cloud

Cloud Courses Description

Managing Cloud Computing Risk

Cloud Courses Description

Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate.

Clinical Trials in the Cloud: A New Paradigm?

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

Cloud Computing Technology

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

Technology & Business Overview of Cloud Computing

Cloud Computing Overview

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Cloud Services Overview

Enterprise Governance and Planning

Validating Enterprise Systems: A Practical Guide

Evaluating the Cloud An Executive Perspective

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Information Technology: This Year s Hot Issue - Cloud Computing

OVERVIEW Cloud Deployment Services

Cloud Computing for SCADA

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

Security & Trust in the Cloud

Secure Cloud Computing through IT Auditing

A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

Cloud Computing--Efficiency and Security

The NIST Definition of Cloud Computing (Draft)

Why Cloud Backup Now? Ashar Baig Senior Director of Product Marketing

journey to a hybrid cloud

Cloud Computing in a Regulated Environment

Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region

Kent State University s Cloud Strategy

Electronic Records Storage Options and Overview

Legal Issues in the Cloud: A Case Study. Jason Epstein

Standardizing Cloud Services for Financial Institutions through the provisioning of Service Level Agreements (SLAs)

Securing the Service Desk in the Cloud

Data Security In The Cloud

Allison Stanton Director of E-Discovery U.S. Department of Justice, Civil Division

Security Issues in Cloud Computing

A white paper from Fordway on CLOUD COMPUTING. Why private cloud should be your first step on the cloud computing journey - and how to get there

Where in the Cloud are You? Session Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle)

CLOUD COMPUTING DEMYSTIFIED

The Elephant in the Room: What s the Buzz Around Cloud Computing?

Security Officer s Checklist in a Sourcing Deal

Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec

The Cloud Computing Revolution: Beyond the Hype

White Paper on CLOUD COMPUTING

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

What Cloud computing means in real life

Cloud Models and Platforms

NIST Cloud Computing Reference Architecture

Virtualization Technologies in SCADA/EMS/DMS/OMS. Vendor perspective Norman Sabelli Ventyx, an ABB company

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?

Realizing the Benefits of Hybrid Cloud. Anand MS Cloud Solutions Architect Microsoft Asia Pacific

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

IT Audit in the Cloud

AskAvanade: Answering the Burning Questions around Cloud Computing

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Seeing Though the Clouds

Cloud Computing: Background, Risks and Audit Recommendations

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

Implementing Microsoft Azure Infrastructure Solutions

Table of Contents. Abstract... Error! Bookmark not defined. Chapter 1... Error! Bookmark not defined. 1. Introduction... Error! Bookmark not defined.

CHAPTER 8 CLOUD COMPUTING

Cloud Computing. What is Cloud Computing?

Fundamental Concepts and Models

Transcription:

Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer

What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction 5 essential characteristics 3 cloud service models 4 cloud deployment models

Essential Characteristics On-demand service Computing capabilities as needed, often from a user portal allowing self-provisioning Broad Network Access Services available over the net using desktop, laptop, PDA, mobile phone Resource pooling Provider resources pooled to server multiple clients, Users are often sharing the same physical machines Rapid Elasticity Ability to quickly scale in/out service levels to meet demand Measured service Services based on metering, usually measured in service/timeframe

Service Models Software as a Service (SaaS) Users access application, Provider manages the network, servers, OS, storage, application, & infrastructure Platform as a Service (PaaS) User deploys their application, Provider supports servers, network, storage, & infrastructure Infrastructure as a Service (IaaS) User controls application, OS, storage, apps, selected network components, Provider Controls the infrastructure

Deployment Models Public Cloud infrastructure is available to the general public, owned by provider selling cloud services Private Cloud infrastructure for single customer only, may be managed by the customer or a 3 rd party, on or off premise Community Cloud infrastructure shared by several customers that have shared concerns, managed by customers or 3 rd party Hybrid Combination of clouds bound by standard or proprietary technology

A Practical Example

Before Moving to the Cloud Identify the asset, application, or information for deployment Data type and sensitivity level Application/Function/Process Evaluate the asset How important is the data or the functionality to the organization. Identify the stakeholders

Asset Evaluation How would we be harmed if the asset became widely public & widely distributed An employee of our cloud provider accessed the asset The process of function were manipulated by an outsider The process or function failed to provide expected results The info/data was unexpectedly changed The asset were unavailable for a period of time Does the deployment type address required security

Understand the Flow of Data Understand the flow of data Can data be used in unintended ways How can data move in/out of the cloud What is your risk tolerance for loss of data

Cloud Computing Architecture Remote Users Cloud Service Examples Lawson (Financial) Workday (HR) Office 365 (Productivity) Data Center Data Center Data Center Network Load Balancer Internet Corporate Network Remote Data Providers Corporate Firewall

Cloud Computing Governance Cloud computing governance is not much different than a traditional governance program. Need to establish processes and controls Effective Information Security Program Providers must provide documentation Service Level Agreements

What Should Audit Consider Physical Where are the server physically located What are the governing laws of that area Compliance Can the provider show a recent SAS 70 Type II, ISO 27001/2, SSAE 16 Type II audit statement? Contractual Right to Audit clause

What Should Audit Consider Legal E-Discovery Ownership of data Clearly defined roles and responsibilities Rights during separation Auditability What regulations impact cloud services Regulatory impact on data security

What Should Audit Consider Data Life Cycle Data storage requirements Comingling of data Disaster Recovery Disaster Recovery Plan Recovery Time Objectives (RTOs)

What Should Audit Consider Information Security Information security is not always a first priority Is an Incident clearly defined Does the provider meet regulatory requirements Application Security Does the provider have a defined Software Development Life Cycle

What Should Audit Consider Encryption Encrypt all data in transit, at rest, backup media Encryption Standards Identity and Access Management Provisioning, deprovisioning User authentication

Final Thoughts Cloud computing should not be scary. Decide on Public or Private depending on risk. With the governance, risk management, information security policy and auditing, a cloud implementation can be as secure a traditional implementation.

References Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 http://www.cloudsecurityalliance.org NIST Cloud Model www.csrc.nist.gov/groups/sns/cloudcomputing/index.html Pizza as a Service Albert Barron, Sr. Software Client Architect at IBM https://www.linkedin.com/pulse/20140730172610-9679881-pizza-as-a-service