Compliance, Audits and Fire Drills: In the Way of Real Security?



Similar documents
A Flexible and Comprehensive Approach to a Cloud Compliance Program

Hans Bos Microsoft Nederland.

Securing the Microsoft Cloud

Securing the Microsoft Cloud

Security Controls What Works. Southside Virginia Community College: Security Awareness

Securing the Cloud Infrastructure

Microsoft s Compliance Framework for Online Services

SUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

CASPR Commonly Accepted Security Practices and Recommendations

kamai Technologies Inc. Commonly Accepted Security Practices and Recommendations (CASPR)

Cloud Operations Excellence & Reliability

Information Security Management System for Microsoft s Cloud Infrastructure

Anypoint Platform Cloud Security and Compliance. Whitepaper

Whitepaper: 7 Steps to Developing a Cloud Security Plan

Helping people make better decisions DATA SECURITY POLICY. Kiilakiventie 1, Oulu, Finland tel:

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

The Value of Vulnerability Management*

Information Security ISO Standards. Feb 11, Glen Bruce Director, Enterprise Risk Security & Privacy

Payment Card Industry Data Security Standard

WHITEPAPER. Compliance: what it means for databases

Consolidated Audit Program (CAP) A multi-compliance approach

Netwrix Auditor. Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure

Harmonizing Your Compliance and Security Objectives. Bonnie A. Goins Adjunct Professor, Illinois Institute of Technology

Five steps to Cloud Adoption. Laurent De Grauwe Sales Manager Datacenter

Cloud Security Trust Cisco to Protect Your Data

Frequently Asked Questions about the HITRUST Risk Management Framework

10 Considerations for a Cloud Procurement. Anthony Kelly Erick Trombley David DeBrandt Carina Veksler January 2015

Cloud Computing Trends, Examples & What s Ahead

Managing risks in a Salesforce environment

Logging In: Auditing Cybersecurity in an Unsecure World

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

The Microsoft approach to cloud transparency

John Essner, CISO Office of Information Technology State of New Jersey

Governance, Risk, and Compliance (GRC) White Paper

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

Impact of New Internal Control Frameworks

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza

Open Certification Framework. Vision Statement

igrc: Intelligent Governance, Risk, and Compliance White Paper

Cloud Security. DLT Solutions LLC June #DLTCloud

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing

Altius IT Policy Collection Compliance and Standards Matrix

StratusLIVE for Fundraisers Cloud Operations

VENDOR MANAGEMENT. General Overview

Robert Brammer. Senior Advisor to the Internet2 CEO Internet2 NET+ Security Assessment Forum. 8 April 2014

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

The Legal Pitfalls of Failing to Develop Secure Cloud Services

Cloud Security Certification

HITRUST CSF Assurance Program

Caretower s SIEM Managed Security Services

IIA Conference. September 18, Paige Needling Director, Global Information Security Recall, Inc.

VMware vcloud Air Security TECHNICAL WHITE PAPER

Are You Prepared to Successfully Pass a PCI-DSS and/or a FISMA Certification Assessment? Fiona Pattinson, SHARE: Seattle 2010

Key Speculations & Problems faced by Cloud service user s in Today s time. Wipro Recommendation: GRC Framework for Cloud Computing

NSW Government Digital Information Security Policy

Leveraging Microsoft Privileged Identity Management Features for Compliance with ISO 27001, PCI, and FedRAMP

HIPAA and HITRUST - FAQ

With Eversync s cloud data tiering, the customer can tier data protection as follows:

Self-Service SOX Auditing With S3 Control

Capabilities Overview

Deploying Cloud Security Standards The MTCS Experience

Tenzing Security Services and Best Practices

SSAE 16 & SAS 70 A Primer on Changes to Service Organization Audit Standards

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard

Managing Cloud Computing Risk

ISO 27001:2005 & ISO 9001:2008

An Overview of ISO/IEC family of Information Security Management System Standards

Cloud Infrastructure Operational Excellence & Reliability

Cloud Services Overview

Amazon Web Services: Risk and Compliance January 2011

Tenzing Security Services and Best Practices

The Importance of IT Controls to Sarbanes-Oxley Compliance

A Decision Maker s Guide to Securing an IT Infrastructure

Nine Steps to Smart Security for Small Businesses

Understanding SOC Reports for Effective Vendor Management. Jason T. Clinton January 26, 2016

Addressing Cloud Computing Security Considerations

CPNI VIEWPOINT 01/2010 CLOUD COMPUTING

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

HyTrust Logging Solution Brief: Gain Virtualization Compliance by Filling Log Data Gaps

Intel Enhanced Data Security Assessment Form

White Paper How Noah Mobile uses Microsoft Azure Core Services

Transcription:

Compliance, Audits and Fire Drills: In the Way of Real Security? Mark Estberg and John Howie Microsoft Corporation Session ID: SP01-203 Session Classification: Intermediate

Introduction Microsoft s Global Foundation Services (GFS) runs a world-class ISMS Our customer is Microsoft itself (not end users) Focus is proving the security and privacy of the data belonging to our internal customers We are ISO/IEC 27001:2005 certified and undergo PCI DSS, SOC (formerly SAS 70) and FISMA audits Despite our program we constantly respond to: Questions about compliance obligations Inquiries from business groups and auditors Fire Drills (both internal and external) 2

Example 1: Firedrill: Industry incident Last year a large online service provider was compromised Microsoft Executives were concerned that Microsoft could be the next target Exacerbated by press rumors and underground chatter Security teams across Microsoft were called in to monitor systems and networks A significant amount of time was taken doing what we already do Resources dedicated to incident response were not able to perform their usual duties 3

Example 2: Inquiry: Audit Preparation An internal customer contracted consultants to prepare them for an upcoming audit Internal customer over-relied on others to tell them what was necessary and suitable Without proper coordination a lot of time was spent examining existing controls for suitability GFS expertise was not relied upon and existing controls and technologies were questioned Internal customer did not want to take a dependency on existing controls and technologies Owners of existing controls spent unnecessary time convincing internal customer of adequacy of controls 4

Example 3: Compliance: Meeting Obligations Multiple compliance obligations for Microsoft appear to conflict with each other Example is Account Lockout in FISMA and PCI DSS Obligations can be commercially infeasible or not applicable/required in some environments Convincing internal customers and auditors that you have suitable compensating controls can be difficult Managing obligations leads to drawn out discussions with internal customers and auditors Discussions focus on spirit of obligations versus implementation 5

Example 4: Audit: Preparatory Work Multiple audits for obligations, standards, etc. assumed by internal customers consume time of control owners and operators Passing audits can inadvertently take precedence over operating, monitoring, responding and optimizing the controls Control owners and operators are required to spend more and more time collecting evidence and answers to auditors questions Often the same questions come up across different audits, or are asked year-over-year SSAE 16 may make this worse! 6

Minimizing The Distractions The key to minimizing distractions is: Leveraging your Information Security Management System (ISMS) Building a compliance framework Integrating security and other control monitoring Distractions will continue to occur, and you have to accept that The more mature your program is the more success you will likely have in minimizing them, though 7

Microsoft s Information Security Management System and Compliance Framework 8

ISO/IEC 27001:2005 ISMS At Microsoft Information Security Management System Predictable Audit Schedule Information Security Management Forum Risk Management Program Information Security Policy Program Compliance Framework ISO / IEC 27001:2005 certification SAS 70 Type I and II attestations (SOC) Sarbanes Oxley PCI DSS certification FISMA certification and accreditation And more

Microsoft s Cloud Infrastructure: Stacked ISMS Consumer and Small Business Services Enterprise Services Third Party Hosted Services Cloud Platform Services Cloud Infrastructure Global Foundation Services Infrastructure Security Global Delivery Sustainability 10

Benefits Of Tiered ISMS Tiered ISMS allows Microsoft to break down security operations into manageable pieces Core security operations in GFS are used and shared by business groups, and save money Shared security infrastructure in a multi-tenanted environment makes it easier to detect malicious activity at the server and network level and deal with it Tiered approach allows internal customers to tailor their ISMS to their customer base JH7 11

Slide 11 JH7 John Howie, 2/10/2012

Compliance Framework Industry Standards and Regulations Payment Card Industry Data Security Standard Health Insurance Portability and Accountability Act FISMA (NIST 800 53 r3) Business requirements, Sarbanes Oxley, privacy laws, etc. Controls Framework Identify and integrate: Regulatory requirements Customer requirements Assess and remediate: Eliminate or mitigate gaps in control design Predictable Audit Schedule Test effectiveness and assess risk Attain certifications and attestations Improve and optimize: Examine root cause of noncompliance Track until fully remediated ISO/IEC 27001:2005 certification Statement of Auditing Standard 70 type II attestation (SOC) Certification and Attestations PCI DSS certification FISMA certification and accreditation, etc. 12

Control Framework: Domains Domains Structure 1. Security policy 2. Organization of information security 3. Asset management 4. Human resources security 5. Physical and environmental security 6. Communications and operations management 7. Access control 8. Information systems acquisition, development, and maintenance 9. Information security incident management 10. Business continuity management 11. Compliance 13

Control Framework: Structure Domains (11) Structure Policy Objectives (62) Control Activities (612) Audit Requirements 1,587 8 Sources Control Owner Documents / Records Testing Procedures Cost Data Historical Health Data Importance Data Maturity Data 14

Rationalized Requirements 15

Benefits Of Compliance Framework The compliance framework and rationalized obligations approach: Eliminates confusion over conflicting compliance obligations and time spent explaining decisions to JH8 internal customers and auditors Drastically reduces time spent preparing for audits by reducing number of times audit evidence is collected 16

Slide 16 JH8 Re-iterated that this is all for internal customers, not external customers John Howie, 2/10/2012

Integrated Control Monitoring and Incident Response 17

Incident Response Security Incident Response is a Tier 2+ function Tiers 0 and 1 are handled by the Microsoft Operations Center (MOC) a fully staffed 24x7 function Initial alarms are handled by trained technicians using documented Trouble Shooting Guides (TSGs) Alarms that cannot be handled by the MOC are escalated to the on-call Security IR team members Security Incident Response follows documented processes that are based on ISO/IEC 18044 and NIST SP800-61 ISO/IEC 27035:2011 not used (yet) 18

Integrated Monitoring Physical Network Identity and Access Management Host Security Application Data 19

Benefits Of Integrated Monitoring Many incidents can indicate a security problem: Network outage Server crash Running out of disk space Integrated monitoring provides a more holistic overview of the state of the environment MOC staff can make connections and report suspicions on to Tier 2 Security Incident Response Shift patterns can be adjusted to handle extraordinary events Having Security Incident Response at Tier 2 frees them up from monitoring controls and allows them to pursue qualified events 20

Bringing it all together 21

Apply Learning To Minimize Distractions Create an Information Security Management System if you do not already have one If you do not know where to start begin with ISO/IEC 27001:2005 Create a control framework Bring together all your compliance obligations together, reconcile conflicts, and design controls Make sure control framework is covered by ISMS Integrate security monitoring with other system and network monitoring Optimize engagement of your deep security subject matter experts 22