Cloud Security Panel: Real World GRC Experiences. ISACA Atlanta s 2013 Annual Geek Week



Similar documents
A Flexible and Comprehensive Approach to a Cloud Compliance Program

Hans Bos Microsoft Nederland.

Cloud Security Alliance and Standards. Jim Reavis Executive Director March 2012

Building an Effective

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

GRC Stack Research Sponsorship

Key Considerations of Regulatory Compliance in the Public Cloud

Open Certification Framework. Vision Statement

Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors

Information Security ISO Standards. Feb 11, Glen Bruce Director, Enterprise Risk Security & Privacy

Cloud Security and Managing Use Risks

Robert Brammer. Senior Advisor to the Internet2 CEO Internet2 NET+ Security Assessment Forum. 8 April 2014

Cloud Security Certification

TOOLS and BEST PRACTICES

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Selecting a Cloud Service Provider (CSP)

SUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

Cloud Computing: Background, Risks and Audit Recommendations

CONTROLLING CLOUDS: BEYOND SAFETY

Cloud Security Introduction and Overview

Compliance, Audits and Fire Drills: In the Way of Real Security?

Cloud Security. DLT Solutions LLC June #DLTCloud

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Orchestrating the New Paradigm Cloud Assurance

Global Efforts to Secure Cloud Computing

SECURITY RISK MANAGEMENT

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Cloud Computing: Compliance and Client Expectations

Global Efforts to Secure Cloud Computing. Jason Witty President, Cloud Security Alliance Chicago

Security Considerations for the Cloud

Protec'ng Data and Privacy in a World of Clouds and Third Par'es Vincent Campitelli

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

The Cloud Security Alliance

Protecting Data and Privacy in the Cloud

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1

EXECUTIVE STRATEGY BRIEF. Securing the Cloud Infrastructure. Cloud. Resources

Five steps to Cloud Adoption. Laurent De Grauwe Sales Manager Datacenter

The silver lining: Getting value and mitigating risk in cloud computing

White Paper How Noah Mobile uses Microsoft Azure Core Services

Securing the Microsoft Cloud

How to ensure control and security when moving to SaaS/cloud applications

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?

The Elephant in the Room: What s the Buzz Around Cloud Computing?

With Eversync s cloud data tiering, the customer can tier data protection as follows:

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

A view from the Cloud Security Alliance peephole

TRUSTED CLOUD. Our commitment to provide a cloud you can trust. Fernando Machado Píriz September 2014

AHLA. JJ. Keeping Your Cloud Services Provider from Raining on Your Parade. Jean Hess Manager HORNE LLP Ridgeland, MS

Cloud Security Benchmark: Top 10 Cloud Service Providers Appendix A E January 5, 2015

Managing Cloud Computing Risk

Cloud Computing Governance & Security. Security Risks in the Cloud

IT Security Compliance for Cloud Service Providers

Cloud Computing Technology

NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT

Auditing Cloud Computing and Outsourced Operations

Logically Securing a Public Cloud Service

How To Protect Your Cloud From Attack

Microsoft s Compliance Framework for Online Services

Aalborg Universitet. Cloud Governance Berthing, Hans Henrik Aabenhus. Publication date: Document Version Preprint (usually an early version)

IT Audit in the Cloud

Securing the Microsoft Cloud

IIA Conference. September 18, Paige Needling Director, Global Information Security Recall, Inc.

Security & Trust in the Cloud

Cloud Computing Security Audit

10 Considerations for a Cloud Procurement. Anthony Kelly Erick Trombley David DeBrandt Carina Veksler January 2015

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Evolving Technology Issues: Cloud Computing

Amazon Web Services: Risk and Compliance July 2012

Information Security Management System for Microsoft s Cloud Infrastructure

Cloud Computing Risk and Rewards

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Microsoft s Datacenter Best Practices. Darryl Chantry Datacenter Solutions Architect Worldwide Datacenter Center of Excellence

The Keys to the Cloud: The Essentials of Cloud Contracting

Compliance and the Cloud: What You Can and What You Can t Outsource

SSAE 16 for Transportation & Logistics Companies. Chris Kradjan Kim Koch

CPNI VIEWPOINT 01/2010 CLOUD COMPUTING

5/29/2015. Auditing IT Contracts From Afar. Disclaimer. Agenda

Cloud Computing What Auditors need to know

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Computing in a Regulated Environment

CFPB Readiness Series: Compliant Vendor Management Overview

Security Issues in Cloud Computing

Lifting the Fog Around Cloud Computing. Eric A. Hibbard, CISSP-ISSAP, ISSEP, ISSMP, CISA CTO Security & Privacy Hitachi Data systems

SECURING HEALTH INFORMATION IN THE CLOUD. Feisal Nanji, Executive Director, Techumen

Cloud Services Overview

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit

Whitepaper. Canopy Security. Simplicity, Agility, Transparency. An Atos company. Powered by EMC 2 and VMware

Assessing Risks in the Cloud

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Cloud models and compliance requirements which is right for you?

Cloud Security Trust Cisco to Protect Your Data

The Cloud Computing Revolution: Beyond the Hype

Transcription:

Cloud Security Panel: Real World GRC Experiences ISACA Atlanta s 2013 Annual Geek Week

Agenda Introductions Recap: Overview of Cloud Computing and Why Auditors Should Care Reference Materials Panel/Questions 2

Introductions Grady Boggs, CISSP Technical Specialist, Security & Identity Microsoft Corporation Reid Eastburn, CISA, CRISC, CISM, HISP (Moderator) Vice President, Information Assurance and Security The Experts Stoddard Manikin, CISM, CISSP Director, Information Systems Security Melanie Morris, CISM, CISSP, ISSAP, HISP, CISA Senior Manager, Risk & Information Security Cox Enterprises 3

Overview of Cloud Computing The use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet) Extension of client-server model Cloud computing, big data, consumerization of IT (BYOD), and virtualization Cloud computing adoption is one of the biggest IT trends. 4

Common Service Models of Cloud Computing Measured service Resource pooling IaaS PaaS SaaS Broad network access Selfservice Rapid elasticity Source: NIST 5

Microsoft s Cloud Environment 6

Why Auditors Should Care Risk typically stays insourced Organizations, and individuals, are outsourcing critical applications and data 24x7 pervasive availability also means your data is accessible to malicious users all day every day Multi-tenant architectures can result in unintended consequences, i.e., data mixing Cloud service providers may not share same goals (profitability vs. implementing controls) Providers don t always follow industry standard security frameworks (ISO, NIST, FISMA, etc.) 7

Survey Data 51% of respondents, believe stormy weather can interfere with cloud computing. 54% of respondents claim to never use cloud computing. 97% are actually using cloud services today via online shopping, banking, social networking and file sharing. Source: 1,000 surveyed by Wakefield research. 8

BENEFITS CONCERNS Adoption Risk and Rewards scalability increased agility flexibility Reduced costs privacy security reliability 9

Provider is your Partner 10

Reference Materials Cloud Security Alliance (CSA) GRC Stack https://cloudsecurityalliance.org/wp-content/themes/csa/download-box-grcstack.php CSA Security Guidance for Critical Areas of Focus in Cloud Computing https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf CSA Security, Trust, and Assurance Registry https://cloudsecurityalliance.org/star Microsoft Global Foundation Services http://www.globalfoundationservices.com/ Microsoft Cloud Security Readiness Tool http://www.microsoft.com/trustedcloud 11

Panel Grady Reid Stoddard Melanie 12

Appendix 13

Common Deployment Models of Cloud Computing Public cloud Private cloud Hybrid cloud Community cloud 14

Security Maturity and Cloud Providers Trust us, we use a firewall We ll be happy to fill out your questionnaire Download a copy of our 3rd party assessment GRC must be built-in from the foundation, not bolted on as an afterthought 15

GRC and Cloud Computing Copyright 2011 Cloud Security Alliance, Inc. All rights reserved 16

The GRC Stack Framework Copyright 2011 Cloud Security Alliance, Inc. All rights reserved 17

GRC Examples in Cloud Computing Governance Jurisdiction for contractual enforcement Data governance Transparency Compliance ASP should follow a methodology (plan, do, check, act) At end of the day, compliance can't be fully outsourced Cloud provider's capabilities and controls must be integrated into your overall compliance program Risk Employ a viable risk assessment and management process Adopt a standardsbased control framework Consider insurance for losses 18

An Approach to Evaluate Cloud Providers Leverage the Cloud Security Alliance (CSA) GRC Stack Cloud Controls Matrix Consensus Assessments Initiative Cloud Audit CloudTrust Protocol Designed to support cloud consumers and cloud providers Prepared to capture value from the cloud as well as support compliance and control within the cloud Also review the Security, Trust, and Assurance Registry (CSA STAR) Public registry of cloud provider self assessments 19

Leveraging the CSA GRC Pack Copyright 2011 Cloud Security Alliance, Inc. All rights reserved 20

Example: Cloud Controls Matrix (CCM) First ever baseline control framework specifically designed for managing risk in the cloud Copyright 2011 Cloud Security Alliance, Inc. All rights reserved 21

Closing Thoughts/Summary Concentrate on GRC as a foundational component of your organization s cloud strategy Demand commitment to standards (CSA Cloud Controls Matrix) and transparency (CSA STAR) Encourage your cloud computing buyers and legal teams to require stipulations like right to audit Build familiarity with your vertical industry's compliance needs Integrate your cloud provider's capabilities and controls into your overall compliance program 22

Technical Specialist, Security & Identity Directory of Security Microsoft Corporation

1,000 surveyed by Wakefield research

Measured service Resource pooling IaaS PaaS SaaS Broad network access Selfservice Rapid elasticity

BENEFIT S CONCER NS scalability increased agility flexibility Reduced costs privacy security reliability

RESPONSIBILITY: IaaS PaaS SaaS Data classification Client and end point protection Identity and access management CLOUD CUSTOMER Application level controls Host security Network controls Physical security CLOUD PROVIDER

Microsoft s Cloud Environment Software as a Service (SaaS) Consumer and Small Business Services Enterprise Services Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Third-party Hosted Services Global Foundation Services Data Centers Operations Global Network Security

Compliance Framework INDUSTRY STANDARDS AND REGULATIONS ISO/IEC 27001:2005 EU Model Clauses FISMA/NIST 800-53 Sarbanes-Oxley PCI-DSS HIPAA, etc CONTROLS FRAMEWORK Identify and integrate Regulatory requirements Customer requirements Assess and remediate Eliminate or mitigate gaps in control design PREDICTABLE AUDIT SCHEDULE Test effectiveness and assess risk Attain certifications and attestations Improve and optimize Examine root cause of non-compliance Track until fully remediated CERTIFICATION AND ATTESTATIONS ISO / IEC 27001:2005 certification SSAE 16/ISAE 3402 SOC 1 AT 101 SOC 2 and 3 PCI DSS certification FISMA certification and accreditation And more

Consult guidance from organizations such as the Cloud Security Alliance Require that the provider has attained third-party certifications and audits, e.g. ISO/IEC 27001:2005 Know the value of your data and processes and the security and compliance obligations you need to meet Consider the ability of vendors to accommodate changing security and compliance requirements Ensure a clear understanding of security and compliance roles and responsibilities for delivered services Ensure data and services can be brought back in house if necessary Require transparency in security policies and operations

CCM control Description DG-01 Data Governance - Ownership / Stewardship All data shall be designated with stewardship with assigned responsibilities defined, documented and communicated. DG-02 Data Governance - Classification Data, and objects containing data, shall be assigned a classification based on data type, jurisdiction of origin, jurisdiction domiciled, context, legal constraints, contractual constraints, value, sensitivity, criticality to the organization and third party obligation for retention and prevention of unauthorized disclosure or misuse.

Where are you now? Where will you be? Can cloud help?