BECOME A SMARTER CLOUD CONSUMER



Similar documents
PHI and the Cloud: Caveat Emptor. Kurt Hagerman Chief Information Security Officer

Hans Bos Microsoft Nederland.

A Flexible and Comprehensive Approach to a Cloud Compliance Program

HIPAA and HITRUST - FAQ

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

Cloud Computing An Auditor s Perspective

Cloud Security and Managing Use Risks

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

GRC Stack Research Sponsorship

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

Cloud Security Panel: Real World GRC Experiences. ISACA Atlanta s 2013 Annual Geek Week

HIPAA and HITECH Compliance Simplification. Sol Cates

Compliance and the Cloud: What You Can and What You Can t Outsource

Security Considerations for the Cloud

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Cloud Platforms Today: The Big Picture

Digital Healthcare: Author. A HIPAA compliant cloud strategy. Choosing a Cloud Service Provider. Alex Ginzburg

Azure and Its Competitors

Customer Success Story. Central Logic. Comprehensive SRA helps healthcare software provider safeguard its customer s PHI and ensure HIPAA compliance.

Case Studies: Protecting Sensitive Data in

Practical Advice for Cloud Data Protection

Cloud Data Security. Sol Cates

Security and Privacy in Cloud Computing

What Every User Needs To Know Before Moving To The Cloud. LawyerDoneDeal Corp.

Locking Down the Cloud for Healthcare. Kurt Hagerman Chief Information Security Officer

Cloud Security. DLT Solutions LLC June #DLTCloud

IBM Impact 2012 Conference. Don t Underestimate Monitoring in the Cloud! Rodney Morrison VP Products SL Corporation

Secure Your Cloud and Outsourced Business with Privileged Identity Management

SUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR

The silver lining: Getting value and mitigating risk in cloud computing

7 INSIGHTS FROM OUR 2014 CLOUD ADOPTION SURVEY

Cloud Security Certification

Open Certification Framework. Vision Statement

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing

Data, Data, Who Has The Data?

SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS

Healthcare Enterprise View of Cloud What is Cloud Additional Needs Cloud Models Cloud Economics 101 Stack Decision Framework

How To Be A Successful Compliance Officer

IPFW Innovate Cloud Service Task Force

Legal Issues in the Cloud: A Case Study. Jason Epstein

Code in the cloud for the cloud jfokus.mybluemix.net

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Why HIPAA Compliance Should Scare You and What You Should Ask Your Business Phone Service Provider NOW

Platforms in the Cloud

SOLUTION WHITE PAPER. IT Business Management and Compliance Ensuring Cloud Governance

Healthcare Data in the Cloud A Gathering Storm of Governance. Erik Pupo Senior Manager, Deloitte

Cloud and Regulations: A match made in heaven, or the worst blind date ever?

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization

Cloud Computing: Background, Risks and Audit Recommendations

HITRUST CSF Assurance Program

PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY

TRUSTED CLOUD. Our commitment to provide a cloud you can trust. Fernando Machado Píriz September 2014

Leveraging the Cloud for Smarter Development On Oilfields; What Does that Entail? Kevin Wagner, Director - Energy

Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors

SECURING HEALTH INFORMATION IN THE CLOUD. Feisal Nanji, Executive Director, Techumen

Cloudy with Showers of Business Opportunities and a Good Chance of. Security. Transforming the government IT landscape through cloud technology

Cloud Security Benchmark: Top 10 Cloud Service Providers Appendix A E January 5, 2015

Cloud Service Rollout. Chapter 9

Secure Cloud Hosting for Healthcare Organizations

How Safe are you in your Cloud?

Global Healthcare Cloud Computing Market

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

Leveraging Technology New Horizons Computer Learning Center of Memphis

Please Read. Apgar & Associates, LLC apgarandassoc.com P. O. Box Portland, OR Fax

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Obtaining CSF Certification Lessons Learned and Why Do It

Protecting Data and Privacy in the Cloud

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

SECURETexas Health Information Privacy & Security Certification Program FAQs

Cloud Hosting. QCLUG presentation - Aaron Johnson. Amazon AWS Heroku OpenShift

5/29/2015. Auditing IT Contracts From Afar. Disclaimer. Agenda

Anypoint Platform Cloud Security and Compliance. Whitepaper

Follow the Money How Cloud Providers' Business Needs Drive Enterprise Identity & Security

ISSN: (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies

COMMUNICATIONS ALLIANCE LTD

Orchestrating the New Paradigm Cloud Assurance

CMIS as the basis for ECM services in the cloud

Cloud Computing Technology

Cloud Services for DevOps: Next-gen PaaS Through MBaaS

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

Data Privacy, Security, and Risk Management in the Cloud

Data Privacy and Security for Market Research in the Cloud

Cloud Computing Risk and Rewards

Cloud Security Alliance and Standards. Jim Reavis Executive Director March 2012

Cloud Computing. Chapter 1 Introducing Cloud Computing

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.

IIA Conference. September 18, Paige Needling Director, Global Information Security Recall, Inc.

How To Get A Cloud Security System To Work For You

Cloud Services Overview

Cloud Computing Security Issues

Hybrid (Cloud) Computing

Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World

Aalborg Universitet. Cloud Governance Berthing, Hans Henrik Aabenhus. Publication date: Document Version Preprint (usually an early version)

The Myths and Magic of Cloud Computing and How it is Revolutionizing the World

Adding Cloud Solutions to Customer Contracts Robert J. Scott

HIPAA Changes Mike Jennings & Jonathan Krasner BEI For MCMS 07/23/13

Licensing Guide for Partners. Leveraging Data Center Providers and Software Services Resellers

Cloud Computing. Technologies and Types

Transcription:

Kurt Hagerman Chief Information Security Officer BECOME A SMARTER CLOUD CONSUMER Ripping through the Rhetoric to Find Your Cloud & Control Your Risk 05/18/2015

ABOUT KURT HAGERMAN Kurt Hagerman Chief Information Security Officer Expert in attaining and maintaining compliance standards, including PCI, HIPAA, ISO 27001, among others. Has conducted hundreds of security reviews and audits across a number of industries including the payment space, healthcare, financial services and higher education. Industry Leadership Cloud Security Alliance SME Council ISACA CSA ISSA

So, you ve decided to explore the cloud for your PHI but are worried about HIPAA compliance.

Have you done your research and come away confused about how various cloud vendors communicate about HIPAA compliance? It s understandable given what they are saying.

Here s What They re Saying HITRUST 2015: Become a Smarter Cloud Consumer

Are you Confused? Frustrated? I know I am. SECURITY Outrageous statements being made They sound good but ring hollow What do they actually mean to you, the cloud consumer, and how will your vendor s stance affect your compliance?

SNAKE OIL, ANYONE? Vendors trivialize HIPAA compliance Vendors over simplify the requirements to sell their services as a silver bullet HIPAA is risk-based for a reason

CONSIDER THE CLOUD MODELS Your responsibilities, and those of your cloud vendor, vary based on the model used by the vendor. Security~You ROLE CLARITY SaaS Software as a Service Security~Them IaaS Infrastructure as a Service PaaS Platform as a Service Software as a Service Platform as a Service Infrastructure as a Service Platform as a Service Infrastructure as a Service Infrastructure as a Service

INFRASTRUCTURE AS A SERVICE (IAAS) Providers: AWS, Azure, Rackspace, SoftLayer, etc. Typically only provide security for the underlying infrastructure Any compliance attestations only apply to underlying infrastructure with no leverage available to customers Vendors forced into signing BAAs, but theirs are typically weak based on the lack of security provided to the customer Customer owns nearly 100 percent of the compliance responsibility IaaS Infrastructure as a Service Infrastructure as a Service

PLATFORM AS A SERVICE (PAAS) Providers: AWS (Elastic Beanstalk), Salesforce (Force.com), IBM SmartCloud, CloudFoundry, HP Helion, etc. Provide development tools and other building blocks for applications and secure these services Compliance attestations apply to the service with limited leverage available to customers PaaS Platform as a Service Will sign BAAs, but typically provide little liability protection based on limited security provided to the customer Customer owns a majority of the compliance responsibility Infrastructure as a Service Platform as a Service

SOFTWARE AS A SERVICE (SAAS) Providers: Salesforce, Box, Epic, Allscripts, Athena, etc. Own the entire stack up through the application SaaS Software as a Service Any compliance attestations apply to the entire service with significant available to customers BAAs are typically stronger based on security provided to customer data and contain reasonable liability language Customer owns very little of the compliance responsibility (at least for the HIPAA security rule) Infrastructure as a Service Platform as a Service Software as a Service

THE MODELS COMPARED IaaS and PaaS are fairly close in terms of the split of responsibility between customer and vendor (PaaS more difficult to parse) Significant shift from PaaS to SaaS in terms of vendor responsibility Risk to your organization increases from IaaS to SaaS

IT S NOT WHAT THEY SAY. IT S WHAT THEY DO Do you know what your vendor is really doing for you? Do they provide information on the specific security controls that are included with their service? Have they mapped their services and security controls to the HIPAA/HITECH requirements? Does your vendor use third parties to provide services to you? Have they (and their third parties) been independently assessed? Do you know who to call when something goes wrong? What about the privacy and breach rule? How do I manage a compliance program with multiple vendors all providing my cloud services?

SIX COMPLIANCE CHALLENGES 1 Identifying the division of responsibility between you and your cloud vendor 2 Ensuring the services your vendor is providing are properly mapped to your risk assessment 3 4 Getting the evidence you need for your audit Obtaining objective attestation documentation from the vendor for the controls they have full or partial responsibility for 5 6 Monitoring ongoing compliance of your vendors Receiving support from vendor during a breach event

BE A SMARTER CLOUD CONSUMER CAVEAT EMPTOR You need to deal with vendors who will be transparent about what they do and how it assists you in mitigating risk and addressing compliance requirements.

BE A SMARTER CLOUD CONSUMER CAVEAT EMPTOR Your Vendor Should: Provide a clear, concise explanation of the specific security controls they include in their service and how these directly assist you in meeting your compliance obligations Articulate the boundaries between their responsibility and yours Provide documentation that backs up assertions about being HIPAA Compliant, including independent audit reports that clearly state: - the scope of the assessment - the control framework used - how compliance can be leveraged by you

WHAT ABOUT BUSINESS ASSOCIATE AGREEMENTS? Many vendors say they are business associate-friendly and that they will sign a BAA. Does their BAA include language that clearly states what services they are providing and what responsibility they are taking for security incidents? Do they suggest this language when reviewing yours?

Thank You Questions? Kurt Hagerman Email kurt.hagerman@firehost.com Phone +1 877 262 3473