How To Write A Secure Cloud Computing For Critical Infrastructure

Similar documents
How can security requirements of critical Infrastructure IT shape Cloud Computing research?

Secure Cloud Computing for Critical Infrastructures

High Assurance in Multi-Layer Cloud Infrastructures

Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

Cloud Inspector A Cooperative Tool to Increase Trust in Cloud Computing

AHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy

Build the cloud OpenStack Installation & Configuration Integration with existing tools and processes Cloud Migration

Guidelines on Data Management in Horizon 2020

Systems Support - Extended

Business Intelligence and DataWarehouse workshop

Cross Agency Priority Goal Quarterly Progress Update

Professional Leaders/Specialists

ITIL Release Control & Validation (RCV) Certification Program - 5 Days

Session 9 : Information Security and Risk

Securely Managing Cryptographic Keys used within a Cloud Environment

How Does Cloud Computing Work?

Electronic and Information Resources Accessibility Compliance Plan

LINCOLNSHIRE POLICE Policy Document

SharePoint Governance

Better Practice Guide Financial Considerations for Government use of Cloud Computing

Cross Agency Priority Goal Quarterly Progress Update

ISO Management Systems. Guidance on understanding the benefits of an ISO Management System

Security Assurance IN Service OuTSourcing (SAINTS)

ITIL V3 Planning, Protection and Optimization (PPO) Certification Program - 5 Days

G-CLOUD FRAMEWORK SERVICE DEFINITION. Oracle Technology Service for Agile Cloud Projects. Copyright: point6 Ltd

State of Wisconsin. File Server Service Service Offering Definition

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

Techno-Legal Motivation

Magenta HR in partnership with breath ehr

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future

Change Management Process

UC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments

How To Manage An Infrmatin Security Gvernance Prgram

Duration of job. Context and environment: (e.g. dept description, region description, organogram)

OnX is uniquely positioned to help your organization rapidly gain the necessary skills to enable the successful deployment of SDN.

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT

Case Study. Sonata develops. comprehensive BI Application for a leading provider of Animal Nutrition Solutions. Ananthakrishnan

Basics of Supply Chain Management

Cloud Services Frequently Asked Questions FAQ

What is Software Risk Management? (And why should I care?)

This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd.

Information Services Hosting Arrangements

Organisational self-migration guide an overview V1-5 April 2014

THOMSON REUTERS C-TRACK CASE MANAGEMENT SYSTEM SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6

Service Level Agreement in IBM T Clud - ITAP

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012

State of Wisconsin DET Agency Managed Virtual Services Service Offering Definition

Basic concept of Cloud computing

Chapter 7 Business Continuity and Risk Management

Customer Support & Software Enhancements Policy

Job Profile Data & Reporting Analyst (Grant Fund)

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013

The Whole of Government Approach: Models and Tools for EGOV Strategy & Alignment

Personal Data Security Breach Management Policy

Enterprise Security Management CIS 259

DSS: tool for Europe-wide esignature interoperability. November 2015 Miguel Alvarez Rodríguez- ISA Unit

JADU DATA PLATFORM SERVICE DEFINITION

OFFICIAL JOB SPECIFICATION. Network Services Analyst. Network Services Team Manager

The ADVANTAGE of Cloud Based Computing:

Delivering Business Value Through IT Cost Transparency Using IT CMF

How Smart City solutions contribute to increased security

Sample Outline for Prelicensure Course in Nursing Informatics

MCSE Private Cloud Master Dos certificaciones en una, consigue el nivel experto en Cloud con el MCSA Windows Server + Pivate Cloud!

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

CNS-205: Citrix NetScaler 11 Essentials and Networking

BRISTOL CITY COUNCIL ROLE AND EMPLOYEE PROFILE: Architect (Practitioner Level) Specific Role Data Architect

Change Management Process For [Project Name]

Internal Audit Charter and operating standards

Interworks Cloud Platform Citrix CPSM Integration Specification

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Enterprise Content Management Solutions. R. Gregory Tschida Chief Information Officer MN.IT Minnesota Department of Revenue

CLOUD COMPUTING: SECURITY THREATS AND MECHANISM

Recognition of Prior Learning (RPL) TAE40110 Certificate IV in Training and Assessment

Mobile Device Manager Admin Guide. Reports and Alerts

Transcription:

SEcure Clud cmputing fr CRitical Infrastructure IT Methds and Technlgies fr Secure Clud Cmputing fr Critical InfrastructureIT Dr Markus Tauber SECCRIT Crdinatr AIT Austrian Institute f Technlgy AIT Austrian Institute f Technlgy ETRA Investigación y Desarrll Fraunhfer Institute fr Experimental Sftware Engineering IESE Karlsruhe Institute f Technlgy NEC Eurpe Lancaster University Mirasys Hellenic Telecmmunicatins Organizatin OTE Ayuntamient de Valencia Amaris

Why we are here SECCRIT Intrductin Technical & Legal Mtivatins Applicatin f Research Outputs Increase the real-wrld implicatins via yu 14.01.2015 SECCRIT Cnsrtium 2

The SECCRIT Prject Research prject n secure Clud Cmputing fr critical infrastructure IT 10 Partners frm Austria, Finland, Germany, Greece, Spain and the UK. Prject budget 4.8 Mi, partly funded by EC FP7 Prgramme Prject duratin 1.1.2013 31.12.2015 60% f the prject cmpleted 25 public deliverables 14.01.2015 SECCRIT Cnsrtium 3

SECCRIT s Overall Gal analyse and evaluate clud cmputing with respect t security risks in sensitive envirnments i.e. critical infrastructures t develp Traffic Cntrl Public Safety (CCTV) methdlgies technlgies, best practices fr secure, trustwrthy, high assurance legal cmpliant clud cmputing envirnments fr critical infrastructure IT. Investigate real-wrld prblems 14.01.2015 SECCRIT Cnsrtium 5

Prblem Definitin High Level Everything ges clud Cnsumer data like ur emails r phts (ggle mail and ther ggle services) Public administratin IT services Sn all kinds f applicatins (incl. Critical Infrastructure - CI) Requirements fr clud applicatins vary Cmmercial applicatins mainly fcus n scalability & elasticity Requirements in CI regarding: verall redundancy, data availability, authenticity, secure access, trust and prtectin f the citizens are typically higher than in cmmercial applicatins. Cmmn Users Requirements cnverge with what is CI standard What is the prblem? Clud services abstract ver used resurces, are paque and make it hard t determine technical reasns fr (security) failure and hence make the develpment f cuntermeasures This als implies, frm a legal perspective, that it is hard t determine wh s fault it is and t shw ne hasn t acted negligent 14.01.2015 SECCRIT Cnsrtium 6

Key Objectives Legal Guidance n Data Prtectin and Evidence Understand and manage risk assciated with clud envirnments Understand clud behavir in the face f challenges Establish best practices fr secure clud service implementatins Demnstratin f utput in real-wrld applicatin scenaris 14.01.2015 SECCRIT Cnsrtium 9

Key Objectives Activities & Output Legal Guidance n Data Prtectin and Evidence Understand and manage risk assciated with clud envirnments Understand clud behavir in the face f challenges Establish best practices fr secure clud service implementatins Demnstratin f utput in real-wrld applicatin scenaris Definitin f legal guidance n SLA cmpliance, prvisin f evidence, and data prtectin fr clud services Risk Assessment and Management Methdlgy Plicy Specificatin Methdlgy and Tl Clud Assurance Prfile and Evaluatin Methd Anmaly Detectin Techniques and Tls Plicy Decisin and Enfrcement Tls Clud Resilience Management Framewrk Tls fr Audit Trails and Rt Cause Analysis Mdel Driven Clud Security Guidelines Orchestratin Secure Clud Strage Dem 1: Strage and Prcessing f Sensitive Data Dem 2: Hsting Critical Urban Mbility Services 14.01.2015 SECCRIT Cnsrtium 10

Key Objectives Activities & Output Legal Guidance n Data Prtectin and Evidence Understand and manage risk assciated with clud envirnments Understand clud behavir in the face f challenges Establish best practices fr secure clud service implementatins Demnstratin f utput in real-wrld applicatin scenaris Definitin f legal guidance n SLA cmpliance, prvisin f evidence, and data prtectin fr clud services Risk Assessment and Management Methdlgy Plicy Specificatin Methdlgy and Tl Clud Assurance Prfile and Evaluatin Methd Anmaly Detectin Techniques and Tls Plicy Decisin and Enfrcement Tls Clud Resilience Management Framewrk Tls fr Audit Trails and Rt Cause Analysis Mdel Driven Clud Security Guidelines Orchestratin Secure Clud Strage Dem 1: Strage and Prcessing f Sensitive Data Dem 2: Hsting Critical Urban Mbility Services Please nte, Clrs describe clustered SECCRIT Research Output 14.01.2015 SECCRIT Cnsrtium 11

SECCRIT Outputs 14.01.2015 SECCRIT Cnsrtium 13

Cmmn Terminlgy - SECCRIT Architecture R. Bless, Flittner, M., Hrneber, J., Hutchisn, D., Jung, C., Pallas, F., Schöller, M., Shirazi, S. Nr ul Ha, Simpsn, S., and Smith, P., Whitepaper "AF 1.0" SECCRIT Architectural Framewrk. 2014. (and IEEE CludCm) 14.01.2015 SECCRIT Cnsrtium 14

SECCRIT Demnstratr: Public Safety (CCTV) MetrSub CitySec TelCm TenSys CludCrp The Subway Operatr The Security Service Prvider The Telecm Operatr The Tenant System Mgmt The Clud Mgmt Prvider 14.01.2015 SECCRIT Cnsrtium 15

SECCRIT Demnstratr: Traffic Cntrl Gather traffic data frm traffic sensrs n the rad OPERATOR Stre traffic data in data bases Generate data and reprts abut traffic status and traffic evlutin Analyse and relate the whle f mbility data Supprt t define mbility plices and traffic cntrl strategies Cntrl traffic n the rad by Traffic Cntrllers, Traffic Ligths, Variable Messages Signals, etc. Incidents Surveillance VIDEO SURVEILLANCE AUTOMATIC INCIDENTS DETECTION Actins Actins Incidents PUBLIC INFORMATION CONTROL SCHEDULED ACTIONS Actins Actins EXPERT SYSTEM Incidents Actins TRAFFIC CONTROL SDCTU STRATEGIC CONTROL Public transprtatin pririty by strategies like ffering traffic lights pririty Execute traffic cntrl strategies by peratrs manual actins r by autmatic prcedures. 14.01.2015 SECCRIT Cnsrtium 16

Bard Members, wh supprt SECCRIT Mre.. 14.01.2015 SECCRIT Cnsrtium 17

SEcure Clud cmputing fr CRitical Infrastructure IT Cntact Dr. Markus Tauber M +43 (0) 664 8251011 markus.tauber@ait.ac.at Austrian Institute f Technlgy (AIT) www.ait.ac.at/ict-security www.seccrit.eu AIT Austrian Institute f Technlgy ETRA Investigación y Desarrll Fraunhfer Institute fr Experimental Sftware Engineering IESE Karlsruhe Institute f Technlgy NEC Eurpe Lancaster University Mirasys Hellenic Telecmmunicatins Organizatin OTE Ayuntamient de Valencia Amaris