Security und Compliance in Clouds



Similar documents
Security and Compliance in Clouds: Challenges and Solutions

Security and Compliance in Clouds

Compliance in Clouds A cloud computing security perspective

Security and Compliance in Clouds

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

Security & Trust in the Cloud

Architecting the Cloud

Cloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Cloud-Security: Show-Stopper or Enabling Technology?

Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken )

Chapter 1: Introduction

Security Issues in Cloud Computing

Clo l ud d C ompu p tin i g

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

How To Protect Your Cloud Computing Resources From Attack

Cloud Security Introduction and Overview

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Private Cloud Database Consolidation with Exadata. Nitin Vengurlekar Technical Director/Cloud Evangelist

Managing Cloud Computing Risk

Cloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak

Virtualization Impact on Compliance and Audit

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

How To Manage Cloud Data Safely

Cloud Security Fails & How the SDLC could (not?) have prevented them


The Private Cloud Your Controlled Access Infrastructure

Addressing Security for Hybrid Cloud

Cloud computing: benefits, risks and recommendations for information security

Cloud Security Specialist Certification Self-Study Kit Bundle

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Key Considerations of Regulatory Compliance in the Public Cloud

Trust but Verify. Vincent Campitelli. VP IT Risk Management

IT Audit in the Cloud

Fujitsu Dynamic Cloud Bridging today and tomorrow

D. L. Corbet & Assoc., LLC

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

CloudCheck Compliance Certification Program

Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011

Cloud Computing Security Issues

How to ensure control and security when moving to SaaS/cloud applications

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

CHAPTER 8 CLOUD COMPUTING

Cloud Security and Managing Use Risks

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Securing the Cloud through Comprehensive Identity Management Solution

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

NIST Cloud Computing Reference Architecture & Taxonomy Working Group

Trust and Dependability in Cloud Computing

Brainloop Cloud Security

Expert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

Public Cloud Workshop Offerings

Security and Privacy in Cloud Computing

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Cloud models and compliance requirements which is right for you?

Seeing Though the Clouds

IBM Security in the Cloud

The Need for Service Catalog Design in Cloud Services Development

Top 10 Cloud Risks That Will Keep You Awake at Night

Security Model for VM in Cloud

Cloud Essentials for Architects using OpenStack

Cloud Security: Getting It Right

Data In The Cloud: Who Owns It, and How Do You Get it Back?

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

BUSINESS MANAGEMENT SUPPORT

Enabling Data Quality

Business-Driven, Compliant Identity Management

Cloud Computing Standards: Overview and ITU-T positioning

ISSN: (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Cloud Security Strategies. Fabio Gianotti, Head of Cyber Security and Enterprise Security Systems

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Data Protection Act Guidance on the use of cloud computing

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Transcription:

Security und Compliance in Clouds Prof. Dr. Jan Jürjens, Kristian Beckers Fraunhofer Institut für Software- und Systemtechnologie ISST, Dortmund http://jan.jurjens.de

The NIST Cloud Definition Framework Hybrid Clouds Deployment Models Service Models Private Cloud Software as a Service (SaaS) Community Cloud Public Cloud Platform as a Service (PaaS) Infrastructure as a Service (IaaS) On Demand Self-Service Essential Characteristics Common Characteristics 2 Broad Network Access Rapid Elasticity Resource Pooling Measured Service Massive Scale Resilient Computing Homogeneity Geographic Distribution Virtualization Service Orientation Low Cost Software Advanced Security (Source: NIST, Effectively and Secure using the Cloud Paradigm, 2009) 2

Security is the Major Issue 3

Cloud Security Goals Confidentiality Data processing in the cloud is still unencrypted Encrypted data storage in the cloud: Shared DB Encrypted data exchange with the cloud: Secure Internet Link Availability Protection of the virtual space of the clouds from e.g. overwrites Redundant clouds / data storage Integrity Prevent unwanted and unrecognized data modification in the cloud Authenticity Authentication of cloud systems to users and vice versa! Non Repudiation Business transactions in clouds require signatures Independent checks of the signatures Privacy Prevent user profiling Conflicting with Non Repudiation 4

Cloud Computing Security Issues Mistakes/Attacks from employees of the provider Attacks from other customers Attacks on the availability Mistakes in the provisioning and the management Misuse of the provider platform Web-Service based attacks (Source: BSI, IT-Grundschutz und Cloud Computing, 2009) 5

Security Level Assurance (SLA) Precise description of the offered services and the expected limitations! Compare different SLAs for my needs. Does a cloud vendor offer an SLA at all? What do the numbers mean: 99.8% per anno availability: ~ 17,5 hours per year the cloud is offline! What are the penalties for SLA violations? Can I monitor the performance of the cloud? Does an early warning system exist? Is the cloud segregated into different security levels? Do I need to separate my data before giving it to the cloud? Should I avoid top secret data to enter the cloud? 6

Security vs. GRC Governance, Risk und Compliance (GRC) Governance: internal company guidelines Compliance: external guidelines, e.g. SOX, EURO-SOX, BASEL II, SOLVENCY II Risk: risk management under consideration of all guidelines Security Abstract security objectives, e.g. CIA applied to a company Security and compliance are closely related but different. 7

GRC in Clouds Governance Risk Compliance Policy design Risk strategy Policy enforcement Classification schema for data and processes Business Impact Analysis Legal compliance (SOX, SOLVENCY II) Threat and Vulnerability Analysis Control implementation Trust chain in a cloud Risk Analysis Remediation The Cloud offers dynamic ressource allocation For GRC in clouds we require the same dynamic 8

Related Standards Process Maturity Holistic Control Systems Security Standards Transparency Safe Harbor 9

Compliance Scenarios Customer -> Cloud: Security Compliance: Check the security processes of the cloud for compliance with SLA Legal Compliance: Check the business process for SOX, MaRisk compliance Cloud -> Cloud: Contract Compliance: Check the interaction of two business partners in the cloud Cloud -> Customer: Security Compliance: Inspect the processes for cloud behavior violation 10

Architectures for Auditable Business Process Execution (APEX) Tool supported method for implementing business processes to IT infrastructure under consideration of compliance policy requirements (like Basel II, Solvency II,...). Analysis is performed on the basis of text documents, models or other data sources Governance, Risk and Compliance (GRC) and measures especially for Cloud Computing for SMEs and large-scale enterprises. 11

Motivation Implementation of compliance regulations is essential: Implementation of EU-Guidelines Basel II, Solvency II till 2012 Implementation of MaRisk from BaFin US-market actors require SOX Today: time-consuming and expensive manual labour Specialists are employed for standard tasks and there is often no time for analysis of special cases e.g. risk of fraud by stuff (spectacular example: Societe Generale 2008: 5 Mrd. Euro loss). APEX approach reduces the manual effort and provides time for GRC experts to focus on specific issues 12

The Idea behind the APEX Approach Automation of standard GRC tasks RoI reduction through manual work reduction Experts focus on special cases Development of GRC information bases for companies Data sources: Interviews, texts, process mining, and processes Risk management concept evaluation Partially automated by APEX framework Support by measures for GRC monitoring Implementation of monitoring tools e.g. in web portals Data can be also used in BPM sector 13

The APEX Framework 14

Log-File Analysis Four-Eyes-Principle Identification of the Four- Eyes-Principle with the help of the following information: Request Ids are conform Owners are different Job was finished at the same point in time 15 15

Business Process Mining Analysis of processes derived with reverse engineering Event dates C A B Process ID Activity ID Consultant Time Stampe 1 A John 9-3-10:15.01 2 A Mike 9-3-10:15.12 3 B Mike 9-3-10:16.07 4 C Carol 9-3-10:18.25 ERP 16 X SCM WfMS... CRM

Business Process Analysis Automated compliance-analysis Two approaches: 1. Text-based analysis of the activity identifier for the automated risk identification 2. Structural analysis of the process model for compliance-violationpattern 17

Text-based Analysis of Process Documentation A text-based analysis of the word in the EPC functions Customer requestsa connection The functions of the EPC are checked for the words Cloudsystemasks for credentials Identify an compliance relevant task: Look for words: Credentials, Login, Check, Verification that hint towards an authentication Customer replies Cloudsystems checkscredentials Credentialsare correct Credentialsare wrong Cloudsystemgrants access Cloudsystemrefuses access 18

Structural Analysis of Process Model Structural analysis of business process models against compliance patterns Example: Check that separation-ofduty is implemented for significant contracts. Pattern: Separation of duty v:vertrag v:vertrag, a!=b : Mitarbeiter :VertragBearbeiten a:mitarbeiter v:vertrag :VertragBearbeiten b:mitarbeiter 19

Compliance Pyramid SOX AktG KWG VAG MARisk Abstract laws and regulations Basel II Solvency II Concrete security policy rules APEX tools 20 ISO 2700x BSI-Grundschutzhandbuch Risk finder Compliance pattern analyzer

Benefit Automatically generated compliance report: For example: Compliant wrt: MaRISK VA (yes / no) Lists requirements that may need further investigation Suggests measurements to improve alignment with compliance requirements: automated correction manual correction Compliance Report Compliance: incomplete Issue: - MaRISK VA 7.2: Accordance to BSI G3.1 needs investigation Measure: - BSI Maßnahmenkatalog M 2.62 21

Possibilities for Cooperation Projects Offerings: Preparation of compliance reports using automated tools Data mining of log files Compliance analysis of business process execution Automated process model generation Support for business process modelling Support for preparation and execution of compliance checks NB: Possibility for public financial support (e.g. BMBF) 22

Technical Prerequisites Ideally: System and/or business process documentation Interface to extract log data Note: Our approach can be easily instantiated to a given architecture (via simple architecture specific adapters). => No restriction on the architecture to be analyzed. 23

Some Projects Pre-cloud: German electronic health card architecture (Gesundheitskarte) Mobile architectures and policies (O2 (Germany)) Digital file store (HypoVereinsbank) Common Electronic Purse Specifications (global standard for electronic purses, Visa International) Intranet information system (BMW) Return-on-Security Investment analysis (Munich Re) Digital signature architecture (Allianz) IT security risk assessment (Infineon) Smart-card software update platform (Gemalto) Cloud: Cloud security ceritification (TÜV-IT, Itesys, LinogistiX) Cloud user security assessment (admeritia, LinogistiX) 24

Conclusion Clouds? Make sure you are secure! ( and compliant) Contact: http://jan.jurjens.de 25