Cloud models and compliance requirements which is right for you?



Similar documents
Application Security Best Practices. Matt Tavis Principal Solutions Architect

2014 HIMSS Analytics Cloud Survey

Using ArcGIS for Server in the Amazon Cloud

Pharma CloudAdoption. and Qualification Trends

Cloud Security and Managing Use Risks

Managing Cloud Computing Risk

Using ArcGIS for Server in the Amazon Cloud

University of Pittsburgh Security Assessment Questionnaire (v1.5)

NCTA Cloud Architecture

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

VMware vcloud Powered Services

Achieve Economic Synergies by Managing Your Human Capital In The Cloud

RemoteApp Publishing on AWS

Third Party Cloud Services Its Adoption in the New Age

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

Secure Cloud Computing through IT Auditing

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

How To Understand Cloud Computing

EXIN Cloud Computing Foundation

Top 10 Cloud Risks That Will Keep You Awake at Night

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

Anypoint Platform Cloud Security and Compliance. Whitepaper

Agenda. - Introduction to Amazon s Cloud - How ArcGIS users adopt Amazon s Cloud - Why ArcGIS users adopt Amazon s Cloud - Examples

Module 1: Facilitated e-learning

319 MANAGED HOSTING TECHNICAL DETAILS

A.Prof. Dr. Markus Hagenbuchner CSCI319 A Brief Introduction to Cloud Computing. CSCI319 Page: 1

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

With Eversync s cloud data tiering, the customer can tier data protection as follows:

Cloud Computing: Background, Risks and Audit Recommendations

How To Pass The Comptia Cloud Essentials Exam

Orchestrating the New Paradigm Cloud Assurance

How to ensure control and security when moving to SaaS/cloud applications

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

AWS alignment with the Australian Signals Directorate (ASD) Cloud Computing Security Considerations

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Primex Wireless OneVue Architecture Statement

Cloud Models and Platforms

BMC s Security Strategy for ITSM in the SaaS Environment

Cloud Computing: Risks and Auditing

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone

Hedge Funds & the Cloud: The Pros, Cons and Considerations

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

Security Issues in Cloud Computing

Deploying a Geospatial Cloud

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS

The Elephant in the Room: What s the Buzz Around Cloud Computing?

Software AG and the AWS cloud. Past, Present and Best Practices. Jonathan Madamba Director, Solution Cloud John Fitzgerald Director, Product Marketing

Case Study. Highly Available, Fault Tolerant Cloud Solution & AWS Managed Support. Case Study. A Telehealthcare Company

Famly ApS: Overview of Security Processes

6 Cloud computing overview

What Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

CompTIA Cloud+ 9318; 5 Days, Instructor-led

How To Protect Your Cloud From Attack

Cloud and the future of Unemployment Sean Rhody, CTO Capgemini Government Solutions

Secure, Scalable and Reliable Cloud Analytics from FusionOps

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers

penelope athena software SOFTWARE AS A SERVICE INFORMATION PACKAGE case management software

Expand Your Infrastructure with the Elastic Cloud. Mark Ryland Chief Solutions Architect Jenn Steele Product Marketing Manager

Electronic Records Storage Options and Overview

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Threat Modeling Cloud Applications

Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

Trust but Verify. Vincent Campitelli. VP IT Risk Management

Business white paper Top 10 reasons to choose Cloud-based Archiving

Amazon Web Services: Risk and Compliance January 2011

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

How To Protect Your Cloud Computing Resources From Attack

Securing The Cloud With Confidence. Opinion Piece

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Architecture Statement

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Transcription:

Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015

Speaker Introduction Bill Franklin, Director, TAAS, East Region (Technology, Advisory and Assessment Services) Coalfire Systems, Inc. Stephanie Tayengco, VP of Technical Operations Logicworks

Cloud / Service / Deployment Models Cloud Considerations Cloud Trends in Healthcare Cloud Adoption Security Responsibility Understanding your cloud provider Q&A

About Coalfire We help our clients recognize and control IT-related risk, and maintain compliance with all major industry and government standards. Our approach and methods validated by more than 5,000 projects Accurate and independent audit and assessments. Consolidated Audit Program across PCI/HIPAA/FISMA/SOC/ISO and more

Cloud models Essential Characteristics Service Models Deployment Models

Service Models Defined NIST Defined SaaS: Software as a Service Software provided as a service running in the cloud providers environment PaaS: Platform as a Service Application development platform runs on cloud providers hardware and development software IaaS: Infrastructure as a Service Hardware Servers, storage solution, network components, and underlying operating systems Others DaaS: Data as a Service One central location for all data of an organization CaaS: Communication as a Service VOIP, Internet Telephony, IM, etc MaaS: Monitoring as a Service Provides monitoring functionality for other services such as applications, servers, or any other IT system or component XaaS: Anything as a Service

Deployment Models Raise Challenges Security and Compliance Accountability and Due Diligence Easier Harder Community Private Public Hybrid

All clouds are not created equal Dedicated Environment Devices and systems dedicated to your business Reduce Risk Increase Cost Multi-Tenant Environment Leverages large servers with multiple clients Devices and systems shared among users Reduce Cost Increase Risk

Multi-Tenant Risk Example Shared Database with multiple clients data Application Error Database Corruption Are Controls in place such as: SDLC (System Development Life Cycle) Authentication Access Rights Data Verification If the controls aren t in place: Your data is exposed to other cloud vendor clients Other cloud vendor clients' data appears in your environment What is the impact? Is it significant?

Which cloud is right for you? Weighing Cloud Service and Deployment Model and Your Environment YOU MUST CONSIDER: 1. How critical the data and applications are to your business 2. Regulatory and/or Data Protection Requirements 3. How integrated cloud services need to be with enterprise functions both: In-house Outsourced 4. Other factors important to your business

Combinations IaaS Service Model PaaS SaaS Private Community Hybrid Public Deployment Model

Benefits Reliability - The inherent resiliency of the cloud provides a higher degree of redundancy and continuity support than is typical Cost Effective - Resource pooling for Utility (email, Collaboration, etc.) functions allows lower cost when provided on a large scale basis Scalable - The ability to meet increased infrastructure needs faster Physical Security - Large scale cloud hosting takes place in facilities that provide a better physical environment and security than most SMB data centers Compliance* - Controls aligned to regulatory requirements (HIPAA, GLBA, PCI, etc.) and control frameworks (NIST 800, ISO 27000, Cobit, etc.) Audits* - Likely to have one or more types of control reports that have been independently tested by a third party (PCI, HIPAA, FISMA, SSAE 16, etc.) * You are still Accountable and must do your Due Diligence

Risks (Due Diligence and Accountability) Data Security Data Backup and Recovery Data Disposal Data Discovery (ediscovery) Data Backup and Recovery Location of the data Geographic locations and applicable regulations Multi-Tenancy Co-mingling data with other cloud customers Data aggregation and inference Data aggregation and inference that could result in breaching the confidentiality of sensitive and confidential information Compliance Lack of controls that meet Regulatory and Industry Requirements - HIPAA, PII (State Regulations), PCI DSS, etc

What are healthcare organizations doing? Cloud vendors are not yet fully trusted: Many healthcare organizations trust the security controls in their own systems more than a cloud provider s. KLAS research revealed: Two-thirds of the hospitals that were interested in the cloud, preferred private clouds that were dedicated to their data and applications. HIMSS focus group of senior health IT executives: they were more comfortable using a private cloud than the public cloud and were more likely to store administrative data than clinical data in the cloud.

Overall cloud trends A HIMSS Analytics study published in mid-2014 showed healthcare providers cloud usage accelerating: Of the 150 survey respondents most of them hospitals and health systems 83% were using the cloud in some way. Half of those organizations had clinical applications in the cloud, and 73% used cloud services for administrative or IT functions. Three quarters of respondents were using private or hybrid cloud services that gave them more control over their data than if they d put everything in the public cloud. Just 23% said they were relying on the public cloud. Source: 2014 HIMSS Analytics Cloud Survey

Reasons for not using the cloud Security (62%) A continuing focus on in-house IT operations (42%) Availability and uptime concerns (39%) However 27% of healthcare cloud users went to the cloud partly because they thought it would improve security. Source: 2014 HIMSS Analytics Cloud Survey

Top reasons for adopting cloud Cost (56%) Speed of deployment (53%) Lack of internal staff/expertise (52%) Disaster recovery (50%) Need for a scalable, always-on solution (45%) Regulatory compliance (42%) Security (27%) Workforce mobility (27%) Source: 2014 HIMSS Analytics Cloud Survey

Move to the Cloud- Things to Do Identify the data to be moved to the cloud Identify risks- Impact to the organization if the data was modified, lost or accessed by an unauthorized individual Identify availability risks Identify applicable regulatory and compliance requirements, restrictions and regulatory concerns Risk Assessment is Critical! Identify a suitable deployment model to meet your needs Identify service providers that offer services in the deployment model Confirm the presence of a robust vendor management program within your organization Business Associate Agreements

About Logicworks 20+ Years Keeping Critical Websites + Internet Applications Up & Running HEALTHCARE HIPAA compliance capable IaaS and Managed AWS With our clients we host: 30 US States Health Information Exchanges (HIE) The largest Health Insurance Exchange (HIX) in the United States The industry s leading Clinical Software-as-a Service (SaaS) providers Global Healthcare Systems Integrators Healthcare Analytics Platforms LEGAL Largest e-discovery / Digital Courtroom Platform in the World 40,000 Law Firms and Every Court in Washington DC 24x7x365 Monitoring Support & Escalation to Expert Engineers 100% SLA with High Availability Services Managed Security Services Database Services Custom Runbooks DR/Backup & Recovery Dev-Ops/Automation Dedicated Named Account Manager FINANCE SaaS Infrastructure for Top 5 Global Banks Investment/Portfolio, 401k, Mortgage Management

Trends in Cloud Adoption In practice we re seeing: Private cloud service adoption by CEs Private and Public cloud service adoption by Service Providers to the Healthcare Industry Driving factors include: Space constraints of in-house datacenters Agility Increased Focus on Core Competencies Security Management Consultation High-Availability architectures and SLAs

Shared Security Responsibility Security in the cloud, whether private or public is a shared responsibility The burden of responsibility can be weighted towards the provider or customer depending on the service model: Self-service Managed Service Have a common understanding of Data Criticality The services Each Party s Responsibilities

Private Cloud Model

Public Cloud Model Secure Architecture DMZ Configuration Intrusion Detection System AWS Directory Service CloudWatch Data Encryption Limited Permissions Limited & Temporary Security Credentials Identity Access Management Log Management Vulnerability Scanning AWS CloudTrail Security/Compliance Bundle Amazon Route 53 Virtual Private Cloud VPC Subnets VPN Connection VPC peering HA Proxy Secure/Compliant Networking & Architecture Hub & Spoke VPC Model

Public Cloud Model Application Diagram Route 53 Launch Configuration NAT Gateway Web Tier ELB Web Tier NAT Gateway Web Tier CloudFront IAM Auto Scaling group Public Subnet CloudFormation ELB Web AMI App Tier App Tier App Tier S3 Encrypted Storage Auto Scaling group App AMI Private Subnet EC2 Images Availability Zone Availability Zone Availability Zone US-East Region

Understanding your Cloud Provider Business Associate Agreements What limitations have been imposed? Responsibilities Matrix Understand what each party is responsible for Review the OCR Audit Protocol with your provider

Bill Franklin Director, Coalfire Bill.Franklin@coalfire.com www.coalfire.com Stephanie Tayengco VP, Logicworks stayengco@logicworks.net www.logicworks.net