Risk, security, and legal analysis for migration to cloud. PART 2: Organising a secured cloud architecture



Similar documents
Project acronym: A novel vocational training programme on cloud computing skills LLP GR-LEONARDO-LMP

Versions Date Changes Type of change Delivered by. Version /04/2015 Initial Document - UCBL and INSA of Lyon

Introduction to migration to cloud

Introduction to migration to cloud

Introduction to migration to cloud

UCBL and INSA of Lyon

Project acronym: A novel vocational training programme on cloud computing skills LLP GR-LEONARDO-LMP

Versions Date Changes Type of change Delivered by. Version /04/2015 Initial Document - UCBL and INSA of Lyon

Versions Date Changes Type of change Delivered by. Version /04/2015 Initial Document - UCBL and INSA of Lyon

Versions Date Changes Type of change Delivered by. Version /04/2015 Initial Document - UCBL and INSA of Lyon

Module 4 objectives Note: due to intellectual property reasons, the logotype of

Security and Privacy in Cloud Computing

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

Outsourcing security in service ecosystems with evolving security deployment as a service

SECURING HEALTH INFORMATION IN THE CLOUD. Feisal Nanji, Executive Director, Techumen

ASETiC and PaaS Taxonomy Overview

Security Issues in Cloud Computing

Guideline on Implementing Cloud Identity and Access Management

Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Lecture 02b Cloud Computing II

Cloud Data Security. Sol Cates

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Cloud Computing Governance & Security. Security Risks in the Cloud

Building Secure Cloud Applications. On the Microsoft Windows Azure platform

Cloud Security. Let s Open the Box. Abu Shohel Ahmed ahmed.shohel@ericsson.com NomadicLab, Ericsson Research

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014

Cloud Data Security and the Insider Threat

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

How To Protect Your Cloud Computing Resources From Attack

Security Issues in Cloud Computing

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

Cloud Essentials for Architects using OpenStack

Securing Cloud Infrastructures with Elastic Security

Securing the Physical, Virtual, Cloud Continuum

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Netzwerkvirtualisierung? Aber mit Sicherheit!

Security & Cloud Services IAN KAYNE

Chapter 11 Cloud Application Development

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka.

Library Systems Security: On Premises & Off Premises

How To Virtualize High Security Servers In A High Trust Zone (Htz)

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Cloud Computing Standards: Overview and ITU-T positioning

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Secure Cloud Computing

Is it Time to Trust the Cloud? Unpacking the Notorious Nine

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Security of Information Systems hosted in Clouds: SLA Definition and Enforcement in a Dynamic Environment

Fundamental Concepts and Models

Cloud Security. DLT Solutions LLC June #DLTCloud

EAaaS Cloud Security Best Practices

How To Manage Cloud Data Safely

Cloud Courses Description

How to ensure control and security when moving to SaaS/cloud applications

Cloud Security: An Independent Assessent

Deliverable 1.2 Project Presentation

A Survey on Cloud Security Issues and Techniques

Cloud Infrastructure Security

Cloud Security Introduction and Overview

The Cloud, Virtualization, and Security

Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) Introduction to Cloud Security. Taniya

Industry. Cyber Security. Information Sharing at the Technical Level. Guidelines

Cloud Courses Description

Top 10 Cloud Risks That Will Keep You Awake at Night

International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: , Volume-1, Issue-5, February 2014

Challenges of Security Risks in Service-Oriented Architectures

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

Providing Flexible Security as a Service Model for Cloud Infrastructure

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Cloud Computing for SCADA

Cloud Computing - Starting Points for Privacy and Transparency

A Look at the New Converged Data Center

A governance framework for mitigating risks and uncertainty in collaborative business processes

Seed4C: A Cloud Security Infrastructure validated on Grid 5000

EMC Forum 2012 Bussum 11 th September Hans Reinhart Business Development

FACING SECURITY CHALLENGES

ESKISP Conduct security testing, under supervision

Cloud computing: benefits, risks and recommendations for information security

What We Can Do in the Cloud (1) -Tutorial for Cloud Computing Course- Mikael Fernandus Simalango WISE Research Lab Ajou University, South Korea

Public Cloud Security: Surviving in a Hostile Multitenant Environment

Introduction to OpenStack

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

What Cloud computing means in real life

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

ICANWK616A Manage security, privacy and compliance of cloud service deployment

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

Transcription:

Project acronym: Project name: Project code: NEBULA A novel vocational training programme on cloud computing skills 540226-LLP-1-2013-1-GR-LEONARDO-LMP Document Information Document ID name: Nebula_WP4_D4.3.1_Learning_Material_and_Content_2015_30_04 Document title: Nebula VET program learning material and content Type: Slides Date of Delivery: 30/04/2015 Work package: WP4 Activity D.4.3.1 Dissemination level: Public Document History Versions Date Changes Type of change Delivered by Version 1.0 15/04/2015 Initial Document - UCBL and INSA of Lyon Version 2.0 26/06/2015 Edition Modifications according to feedback provided by partners UCBL and INSA of Lyon Version 2.1 02/09/2015 Edition Insertion of license type UCBL and INSA of Lyon Acknowledgement The persons of UCBL in charge of producing the course are Parisa Ghodous, Catarina Ferreira Da Silva, Jean Patrick Gelas and Mahmoud Barhamgi. The persons from UCBL involved in preparing, translation and review are Hind Benfenatki, Gavin Kemp and Olivier Georgeon. The persons of INSA of Lyon in charge of producing the course are Frédérique Biennier, Nabila Benharkat. The persons from INSA of Lyon involved in preparing, translation and review are Francis Ouedraogo and Youakim Badr. Disclaimer The information in this document is subject to change without notice. All rights reserved. This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. This publication reflects the views only of the author, and the Commission cannot be held responsible for any use, which may be made of the information contained therein.

Module 3 objectives The aim of this module is to provide the student with the capabilities to analyse the risks and legal implications associated to the migration process, assessing their influence in the data, processes, and applications ------------------------------------------------------------------- Note: due to intellectual property reasons, the logotype of UCBL must remain in all utilisation of this course content, as well as the note copyright DUNOD mentioned in some slides with figures.

Risk, security, and legal analysis for migration to cloud PART 2: Organising a secured cloud architecture

According to you, how can you assess the risks associated to the Cloud Migration? Do you know some risks analysis methods? Are you aware of security project in your organisation? Do you know some Cloud security models? How can you evaluate organisational risks? How can you evaluate Cloud platform risks?

According to you, how can you assess the risks associated to the Cloud Migration? In this part you will Learn basic principles of Security Risks management methods Get information to compare some methods and organise a security project Learn basic Cloud security models Get information on Business and Cloud platform security models Identify security risks associated to a Business Process migration

PART 2 OVERVIEW 1. Security models and methods 2. Cloud security models 3. Cloud risks evaluation

Methods to design secured systems Different goals Security policy specification Security goals Risks identification Methods Ebios Octave Secured infrastructure organisation Safe SNA Introduction os security constraints in IS / process design: Security by design?

Vulnerabilities classes Organisation related vulnerabilities Backup management Role and access rights management Software components related vulnerabilities Code audit Software certification Communication infrastructure related vulnerabilities Intrusion Tapping communication traffic Deny of service Environment related vulnerabilities

Methods to manage a security project Traditional project organisation Preliminary study -> Perimeter and requirements definition Specification -> Threats and vulnerabilities identification Integration of solutions to mitigate risks Deployment Choose convenient technologies Organise the architecture Major need Engineering the Global architecture with an end to end perspective Know precisely who is responsible for what Knowledge bases provided by the different methods (EBIOS, MEHARI, OCTAVE, SNA, Safe )

Comparison of different methods EBIOS OCTAVE Requirements analysis Design Implementation Risks and security goals identification Identification of the way IS can be acceded Protection patterns Best practices and security goals organisation Audit and implementation + project management SNA IT components and Business Process identification Design of an attackproof system Information on attacks and implementaiton of knowledge bases MEHARI Limited risks analysis Best practices Enterprise security dashboards

Cloud risks Is security different for Clouds? Cloud has its own vulnerabilities Architecture Hypervisor Distributed system Different software components Organisation Different actors Responsibilities areas Distributed system using hot plug / hot deployment Difficulties related to the use conditions Personal data Reading / understanding difficulties

Jericho Forum security model Three axes define how the cloud is controlled Where the cloud is implemented Who manages the Cloud Which kind of software Picked from the Jericho s Forum

Cloud Security Alliance Software stack oriented standard specifications Top threats analysis (https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf) CSA also provides a risk analysis tool (https://cloudsecurityalliance.org/download/grc-stack/)

Picked from CSA Cloud Security Alliance

Risks and controls XaaS IaaS PaaS SaaS Security criteria Confidentiality Integrity Availability Non Repudiation Secured network and physical access to infrastructures Design APIs without weaknes and implement platform access control Data security management Users and hosting process integrity control on each cloud node API integrity Exchanged messages and processed data integrity management Resources (bandwith, storage, network, VM computing environment.) availability APIs and Cloud platform availability Data and application availability Manage, monitor and log actvities related to network, storage, computing and VMs resources Log platform accesses Identify and log accesses to applications and data

Risks depending on Cloud types Deployment model Private Cloud Public Cloud Security challenges Data confidentiality and integrity must be taken into account as in classical Information System The Cloud manager / owner is reponsible for the consequences in case of damages Data confidentiality and integrity as in private Cloud + provide isolation means so that data belonging to different clients won t be mixed Check that the Cloud legal environment that will be used will not compromise Data confidentiality (ex: US Patriot Act) Community cloud Hybrid Cloud The global security policy should comply each entreprise security policy. This is difficult as corporates do not have the same security / collaboration / Cloud hosting strategies Integrate all challenges related to the different cloud types.

Data classification Traffic Light Government Description Protocol classification RED Top secret Highly sensitive data that must not be shared. Any disclosure causes exceptionally grave damages. ORANGE Secret Very sensitive data that can only be shared with members of the organisation who need to know this data to achieve their tasks. Any disclosure beyond this restricted perimeter will seriously damage corporate safety. GREEN Confidential Sensitive data that can be shared with authorise parners and / or members of the community. Disclosure beyond this perimeter negatively impacts security. LIGHT GREEN Restricted Low sensitive data that can be shared with the members of the organisation. Its disclosure may have unsuitable effects. BLANC Unclassified Non sensitive data that can be accessed / shared without any restriction provided that authoring rights / licensing are controlled / respected. It does not require any authorisation

Business security model Integration of organisational specification Define data and process patrimonial value Financial / personal / strategic Identification of actors / rights Who can accede / launch / use When, from where and how See the excel file Functional&OrganizationlSpecification FunctionalSpecification OragnizationalSpecification AccessControl OtherFunctional Financial Strategic personnal Picked from W. F. Ouedraogo PhD Thesis p. 196 When FromWhere Who How

Platform model and associated risks Cloud type identification Owner XaaS level Specific threat identification 0..* Trust 0..1based on0..* Platform Trust assess 1..1 Clien define 1..* CloudDeployType GeneralSpecification 1..* 0..* define 1..* CloudServiceType 1..1 has 1..* SecuritySpecification 1..1 1..* implement SecurityMechanism Resource 0..* concerne 0..* 0..1 has 0..* 0..1 1..* can be reduced by 0..* concern Vulnerability CounterMeasure 1..* 1..* Threat 0..1 use Logical Application Infrastructure Communication Confidentiality NonRepudiation Integrity Availability Picked from W. F. Ouedraogo PhD Thesis p. 209

Case study Pick a use case e-service workflow organisation Annotate the security requirements (depending on the functional specification / process organisation) with the set of questions from the excel file (WP431_D431-module3- part2-risks_questionnaire.xlsx)

Case study Based on the migration strategy, characterize the target deployment environment using the excel file (WP431_D431-module3-part2- risks_questionnaire.xlsx)