Cloud Security Guidance



Similar documents
Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Supplier Information Security Addendum for GE Restricted Data

Supplier Security Assessment Questionnaire

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

PCI Compliance for Cloud Applications

SELECTING AN ENTERPRISE-READY CLOUD SERVICE

Big Data, Big Risk, Big Rewards. Hussein Syed

Table 1 Question Answer Explanation Next Question 1. Sensitive data?

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Third Party Security: Are your vendors compromising the security of your Agency?

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Cloud Service Baseline Requirements

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Cyber security tackling the risks with new solutions and co-operation Miikka Pönniö

Central Agency for Information Technology

3. Are employees set as Administrator level on their workstations? a. Yes, if it is necessary for their work. b. Yes. c. No.

Using SharePoint 2013 for Managing Regulated Content in the Life Sciences. Presented by Paul Fenton President and CEO, Montrium

Logging In: Auditing Cybersecurity in an Unsecure World

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

External Supplier Control Requirements

Managing Cloud Computing Risk

Cloud Security:Threats & Mitgations

Trust but Verify: Best Practices for Monitoring Privileged Users

Dispelling the Myths about Cloud Computing Security

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

(Instructor-led; 3 Days)

Enterprise level security, the Huddle way.

Securely Yours LLC Top Security Topics for Sajay Rai, CPA, CISSP, CISM

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Introduction to Cyber Security / Information Security

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Securing Virtualization with Check Point and Consolidation with Virtualized Security

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Security Controls What Works. Southside Virginia Community College: Security Awareness

New Risks in the New World of Emerging Technologies

Caretower s SIEM Managed Security Services

Cloud Computing: Legal Risks and Best Practices

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Information Technology Policy

Cloud Security Strategies. Fabio Gianotti, Head of Cyber Security and Enterprise Security Systems

Information Security It s Everyone s Responsibility

HIPAA Security Balancing Security & Costs

05.0 Application Development

Security Policy JUNE 1, SalesNOW. Security Policy v v

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Through the Security Looking Glass. Presented by Steve Meek, CISSP

INCIDENT RESPONSE CHECKLIST

Cloud Computing: Risks and Auditing

Whitepaper. What You Need to Know About Infrastructure as a Service (IaaS) Encryption

Information Technology General Controls And Best Practices

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

HIPAA/HITECH Compliance Using VMware vcloud Air

Security Information & Policies

External Supplier Control Requirements

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Vendor Risk Assessment Questionnaire

IIABSC Spring Conference

How To Protect Yourself From A Hacker Attack

Agenda. Cyber Security: Potential Threats Impacting Organizations 1/6/2015. January 10, 2015 Scott Petree

How To Understand Your Potential Customer Opportunity Profile (Cop) From A Profit Share To A Profit Profit (For A Profit)

With Great Power comes Great Responsibility: Managing Privileged Users

Enterprise Architecture Review Checklist

Cloud Storage Security

Security from a customer s perspective. Halogen s approach to security

Passing PCI Compliance How to Address the Application Security Mandates

Certified Information Systems Auditor (CISA)

Taking a Proactive Approach to Crisis Management while Maintaining Business Continuity in a Tiered Environment

Newcastle University Information Security Procedures Version 3

H.I.P.A.A. Compliance Made Easy Products and Services

ARS v2.0. Solution Brief. ARS v2.0. EventTracker Enterprise v7.x. Publication Date: July 22, 2014

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Securing Endpoint Data While Enabling the Mobile Workforce

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Third Party Security Requirements Policy

RSA Security Anatomy of an Attack Lessons learned

Cloud Security Trust Cisco to Protect Your Data

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

F G F O A A N N U A L C O N F E R E N C E

KEY TERMS FOR SERVICE LEVEL AGREEMENTS TO SUPPORT CLOUD FORENSICS

Data-centric Security

The Respect Network Technical and Operational Specifications Version 1.0

Fortinet Solutions for Compliance Requirements

Adopting Cloud Apps? Ensuring Data Privacy & Compliance. Varun Badhwar Vice President of Product Strategy CipherCloud

Bellevue University Cybersecurity Programs & Courses

Eleventh Hour Security+

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

Top 10 Cloud Risks That Will Keep You Awake at Night

Onegini Token server / Web API Platform

Addressing Cloud Computing Security Considerations

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

Music Recording Studio Security Program Security Assessment Version 1.1

Transcription:

Cloud Security Guidance February 2015 Tania Martin Smals Research www.smalsresearch.be

Overview of the cloud 2/66

What about the security of the cloud? Not 100% garanteed by the cloud services Problematic for sensitive data Especially in our context «social security and ehealth» Assess the security of a cloud service before using it 3/66

During this presentation Look through the key-points of cloud security Common thread Security assessment model of cloud services + Dropbox for Business 4/66

Agenda 1 Security assessment model Governance Identity and access management IT security Operational security 2 Example: Dropbox for Business 3 How to choose a cloud service 4 Conclusion 5/66

Security assessment model

Goal of the model Help for security experts Practical model «Which cloud service can I use if I want to send there a given type X of data?» 7/66

Goal of the model Help for security experts Pratical model Eliminate/filter non fruitful tracks «Which cloud service can I use if I want to send there a given type X of data?» Select potential candidates 8/66

Components of the model 4 major criteria Governance Identity and Access Management IT Security Operational Security Cloud Policy of the Belgian social security Type of data 2 evaluation forms Assess the security level of a cloud service Assess the possibility of using a cloud service 9/66

Components of the model 4 major criteria Governance Identity and Access Management IT Security Operational Security Cloud Policy of the Belgian social security Type of data 2 evaluation forms Assess the security level of a cloud service Assess the possibility of using a cloud service 10/66

Dropbox for Business What looks like the model? 11/66

Governance

Legal implications Which laws apply to the data? Not OK!!! REF Voc: CSP (Cloud Service Provider) 13/66

Supply chain management CSP always responsible for its contractual commitments?! 14/66

Audit Every 6 months 10 /10 Every year 15/66

Meta-data extracts? Meta-data only used for the cloud service?! 16/66

Quality of the service Plan of business continuity SLA Reversibility of the service 17/66

Governance: to remember Which laws? Reliable supply chain? Regular audit? No misuse of meta-data? Good quality of service? 18/66

Identity and Access Management

Authentication level Username + Password! Username + Password + Token Username + Password + Certificat Username + Password + Certificat/Token + Location 10 /10 20/66

Authentication level «2-factor» authentication Username + Password + Token Username + Password + Certificat Username + Password + Certificat/Token + Location 10 /10 21/66

User management! 10 /10 trusted 22/66

Well defined Forbidden Access management 23/66

IAM: to remember 2-factor authentication? Controlled user management? Well-defined access management? 24/66

IT Security

Security standards OS Anti-virus, anti-malwares Patch management process Acceptance environments Physical + Virtual Infra Network security: firewall, APT detection tools REF Monitoring: IDS/IPS, file integrity Data leak detection: DLP tools Protection of hypervisors and admin consoles Secure data deletion: crypto wiping, demagnetization Interface Data integrity and security in input and output API developed according to standards (e.g. OWASP) REF 26/66

Private Segregation of data Community Off-premises/On-premises Off-premises/On-premises! Very important point BUT often not documented 27/66

Cryptography Confidentiality towards the CSP encryption Strong crypto??? Outils: REF Confidentiality encryption Integrity hash, digital signature?????? 28/66

At the CSP s Key management + = At the user s! J ai oublié/perdu ma. Mes données sont irrécupérables!!! At the sysadmin s or TTP s?????? 29/66

IT security: to remember Security standards in place? Segregation of data? Cryptography standards used? Data confidentiality and integrity? Key management at the sysadmin s? 30/66

Operational Security

Backup and disaster recovery Adaptable plan of backup Hey I want some backups for my data! No problem! We have: Plan A Plan B Plan C Plan of disaster recovery No panic!!! We have: Some values on the RTO and RPO 1 week 1 day! 1 hour 10 /10 Voc: RTO (Recovery Time Objective), RPO (Recovery Point Objective) 32/66

Incident management Log forensics Log collection User activity monitoring Log retention Appropriate incident management Preparation IT compliance SIEM File integrity monitoring Mitigation Response REF Event correlation Dashboards Recovery Security training of employees REF 33/66

Operational security: to remember Adaptable plan of backup? RTO and RPO < 1 day? SIEM? Appropriate incident management? Security training of employees? 34/66

Example: Dropbox for Business

How works the model? 36/66

Result for the governance Category Title Score Minimal weighted score Maximal weighted score 1 Governance 41% 66% 1.1 Legal implication 6% 11% 1.1.1 What is the physical location of data-at-rest? Unknown 5,25 21 1.1.2 Which jurisdiction is the CSP subject to? US 10,5 10,5 1.1.3 Can the CSP accomodate with the tenant's data retention requirements? Unknown 0 8 1.1.4 Can the data be given to governments if requested for judicial requirements without informing the tenant or without constitutional guarantees? Yes 0 0 1.1.5 Can the data be given to, shared with third parties, or used by the CSP for other purposes than the cloud service without the tenant s consent? Yes 0 0 1.1.6 If the US-EU Safe Harbor applies, is the CSP registered? Yes 8 8 1.2 Supply chain management 18% 22% 1.2.1 Does the CSP use subcontrators? Yes 40 40 1.2.2 If so, will the CSP inform the tenant of the subcontractors hired to provide the cloud service? Yes 20 20 1.2.3 If so, will the CSP inform the tenant of any change in the course of the contract? Yes 20 20 1.2.4 If so, does the CSP guarantee contractually to remain fully responsible for his engagements, even with the hiring of subcontractors? Unknown 0 20 1.3 Audit 10% 10% 1.3.1 At which time interval is the cloud service (including all its subcontractors) audited by a third party? 1 year 12,75 12,75 1.3.2 If the cloud service is audited, are the scopes of the audits accurately defined? Yes 32 32 1.3.3 At which time interval is the cloud service (including all its subcontractors) pen-tested? 1 year 5,95 5,95 1.3.4 Did the cloud service define an ISP (Information Security Policy) and obtain a security-related certification? Yes, ISP and certificate(s) 14 14 1.3.5 Is there a Tier certification of data centers (especially for physical availability and security) or equivalent certification? No Tier certification or equivalent 0 0 1.4 Business continuity 0% 8% 1.4.1 Is the cloud service delivery managed under SLAs (Service Level Agreements)? No 0 0 1.4.2 Does the CSP define and implement a business continuity plan? Unknown 0 33 1.4.3 Is the reversibility of the cloud service provided? No 0 0 1.5 Others 8% 15% 1.5.1 Does the CSP apply a segregation of duties in the CSP organization to protect the tenants? Unknown 0 50 1.5.2 If meta-data are extracted by the CSP from the process of tenant's data, are they used for the cloud service only? Yes 50 50 37/66

Worst case vs. Best case Worst case Best case 38/66

Result for the governance 39/66

Preliminary result of the analysis Minimal Maximal weighted weighted score score Governance 41% 66% IAM 64% 72% IT Sec 37% 76% Ope Sec 20% 66% 40/66

Cloud policy of Belgian social security Goal? Established the security requirements when an institution of the social security is considering using a cloud service URL? QR code of the URL REF Model? Each point is considered in the model But the model goes a bit further in the analysis 41/66

Cloud policy in the model Category Title Score Minimal weighted score Maximal weighted score 1 Governance 41% 66% 1.1 Legal implication 6% 11% 1.1.1 What is the physical location of data-at-rest? Unknown 5,25 21 1.1.2 Which jurisdiction is the CSP subject to? US 10,5 10,5 1.1.3 Can the CSP accomodate with the tenant's data retention requirements? Unknown 0 8 1.1.4 Can the data be given to governments if requested for judicial requirements without informing the tenant or without constitutional guarantees? Yes 0 0 1.1.5 Can the data be given to, shared with third parties, or used by the CSP for other purposes than the cloud service without the tenant s consent? Yes 0 0 1.1.6 If the US-EU Safe Harbor applies, is the CSP registered? Yes 8 8 1.2 Supply chain management 18% 22% 1.2.1 Does the CSP use subcontrators? Yes 40 40 1.2.2 If so, will the CSP inform the tenant of the subcontractors hired to provide the cloud service? Yes 20 20 1.2.3 If so, will the CSP inform the tenant of any change in the course of the contract? Yes 20 20 1.2.4 If so, does the CSP guarantee contractually to remain fully responsible for his engagements, even with the hiring of subcontractors? Unknown 0 20 1.3 Audit 10% 10% 1.3.1 At which time interval is the cloud service (including all its subcontractors) audited by a third party? 1 year 12,75 12,75 1.3.2 If the cloud service is audited, are the scopes of the audits accurately defined? Yes 32 32 1.3.3 At which time interval is the cloud service (including all its subcontractors) pen-tested? 1 year 5,95 5,95 1.3.4 Did the cloud service define an ISP (Information Security Policy) and obtain a security-related certification? Yes, ISP and certificate(s) 14 14 1.3.5 Is there a Tier certification of data centers (especially for physical availability and security) or equivalent certification? No Tier certification or equivalent 0 0 1.4 Business continuity 0% 8% 1.4.1 Is the cloud service delivery managed under SLAs (Service Level Agreements)? No 0 0 1.4.2 Does the CSP define and implement a business continuity plan? Unknown 0 33 1.4.3 Is the reversibility of the cloud service provided? No 0 0 1.5 Others 8% 15% 1.5.1 Does the CSP apply a segregation of duties in the CSP organization to protect the tenants? Unknown 0 50 1.5.2 If meta-data are extracted by the CSP from the process of tenant's data, are they used for the cloud service only? Yes 50 50 42/66

Cloud policy in the model Category Title Score Minimal weighted score Maximal weighted score 1 Governance 41% 66% 1.1 Legal implication 6% 11% 1.1.1 What is the physical location of data-at-rest? Unknown 5,25 21 1.1.2 Which jurisdiction is the CSP subject to? US 10,5 10,5 1.1.3 Can the CSP accomodate with the tenant's data retention requirements? Unknown 0 8 Compliance with cloud policy 1.1.4 Can the data be given to governments if requested for judicial requirements without informing the tenant or without constitutional guarantees? Yes 0 0 X 1.1.5 Can the data be given to, shared with third parties, or used by the CSP for other purposes than the cloud Yes service without the tenant s consent? 0 0 X 1.1.6 If the US-EU Safe Harbor applies, is the CSP registered? Yes 8 8 1.2 Supply chain management 18% 22% 1.2.1 Does the CSP use subcontrators? Yes 40 40 1.2.2 If so, will the CSP inform the tenant of the subcontractors hired to provide the cloud service? Yes 20 20 V 1.2.3 If so, will the CSP inform the tenant of any change in the course of the contract? Yes 20 20 V 1.2.4 If so, does the CSP guarantee contractually to remain fully responsible for his engagements, even with Unknown 0 20?? the hiring of subcontractors? 1.3 Audit 10% 10% 1.3.1 At which time interval is the cloud service (including all its subcontractors) audited by a third party? 1 year 12,75 12,75 V 1.3.2 If the cloud service is audited, are the scopes of the audits accurately defined? Yes 32 32 V 1.3.3 At which time interval is the cloud service (including all its subcontractors) pen-tested? 1 year 5,95 5,95 V 1.3.4 Did the cloud service define an ISP (Information Security Policy) and obtain a security-related certification? 1.3.5 Is there a Tier certification of data centers (especially for physical availability and security) or equivalent certification? Yes, ISP and certificate(s) No Tier certification or equivalent 14 14 V 0 0 X 1.4 Business continuity 0% 8% 1.4.1 Is the cloud service delivery managed under SLAs (Service Level Agreements)? No 0 0 X 1.4.2 Does the CSP define and implement a business continuity plan? Unknown 0 33?? 1.4.3 Is the reversibility of the cloud service provided? No 0 0 X 1.5 Others 8% 15% 1.5.1 Does the CSP apply a segregation of duties in the CSP organization to protect the tenants? Unknown 0 50 1.5.2 If meta-data are extracted by the CSP from the process of tenant's data, are they used for the cloud service only? Yes 50 50 43/66

Compliance display in the model Minimal weighted score Maximal weighted score Compliance with cloud policy Governance 41% 66% IAM 64% 72% IT Sec 37% 76% Ope Sec 20% 66% 44/66

Minimal Maximal weighted weighted score score Governance 41% 66% IAM 64% 72% IT Sec 37% 76% Ope Sec 20% 66% Full result of the analysis 45/66

Minimal Maximal weighted weighted score score Governance 31% 68% IAM 34% 41% IT Sec 16% 76% Ope Sec 7% 66% What about Dropbox Free? 46/66

Minimal Maximal weighted weighted score score Governance 31% 68% IAM 34% 41% IT Sec 16% 76% Ope Sec 7% 66% What about Dropbox Free? 47/66

How to choose a cloud service

Goal of the model Help for security experts Pratical model Eliminate/filter non fruitful tracks «Which cloud service can I use if I want to send there a given type X of data?» Select potential candidates 49/66

How to choose a good candidate? 1 2 3 Experts analyze cloud services Results are published Client makes a self-assessment of his needs/requirements Client compares: / = 50/66

Self-assessment Which type of data? Which security level? 51/66

Self-assess: which type of data? Public https://www.ksz.fgov.be/ Internal Confidential Financial roadmap Committee reports Personal Social Medical NISS Ref: Data classification policy of the Belgian social security REF 52/66

Self-assess: which security level? Governance IAM IT Security Operational Security Question 1? Question 2? Question 1? Question 2? Question 1? Question 2? Question 1? Question 2? High Medium Low 53/66

Self-assess: which security level? Governance Question 1? Question 2? Required score IAM Question 1? Question 2? Required score IT Security Question 1? Question 2? Required score Operational Security Question 1? Question 2? Required score 54/66

Example: pay slip storage Category Title Score Required score 0 Data Type 0.1 What type of data is intended to be moved to a cloud service? Personal Explanations / Examples The choices of data type are extracted from the Data Classification Policy of the Social Security. Score specification Public e.g. web site of BCSS/KSZ Internal to the company e.g. internal strategy, agenda, contact, email Confidential of the company e.g. financial roadmap Personal e.g. HR personal folder Personal and social e.g. National register data Medical e.g. medical record 1 Governance 75% 1.1 Which level of governance must be attained by the cloud service? High 75 2 Identity and Access Management (IAM) 78% 2.1 Which level of authentication must be offered by the cloud service? High 28,9 2.2 Which level of control on the user management must be proposed by the cloud service? High 24,75 2.3 Which level of access management must be provided by the cloud service? High 24,75 3 IT Security 68% 3.1 Which deployment model must be provided by the cloud service? Community cloud 16,5 3.2 Which level of interface security must be provided by the cloud service? High 12 3.3 Which level of infrastructure and virtualization security must be achieved by the cloud service? High 22,5 3.4 Which level of cryptography must be provided by the cloud service? High 16,8 4 Operational Security 75% 4.1 Which level of backup and disaster recovery must be provided by the cloud service? High 37,5 4.2 Which level of incident management must be provided by the cloud service? High 37,5 55/66

Example: pay slip storage 56/66

Example: pay slip storage Minimal Maximal Does Required weighted weighted score score score Governance 41% 66% 75% DOES NOT satisfy IAM 64% 72% 78% DOES NOT satisfy IT Sec 37% 76% 68% MAY satisfy Ope Sec 20% 66% 75% DOES NOT satisfy Dropbox for Business satisfy the required score? DOES NOT SATISFY 57/66

Example: pay slip storage Minimal Maximal Does Required weighted weighted score score score Governance 65% 83% 75% MAY satisfy IAM 97% 97% 78% DOES satisfy IT Sec 58% 81% 68% MAY satisfy Ope Sec 63% 73% 75% DOES NOT satisfy Office 365 for Business satisfy the required score? DOES NOT SATISFY 58/66

Example: pay slip storage 59/66

Example: pay slip storage 60/66

Example: pay slip storage Relaxing the requirements: Office 365 for Business MAY SATISFY 61/66

Conclusion

Conclusion Cloud security is crucial Proposition of such an assessment tool: the model Especially if we want to send there sensitive data! Importance of assessing the security of a cloud service A human expert is the only true judge of the result 63/66

Where is the model? Version FR Version NL URL? REF For who? Security experts and counsellors 64/66

Some interesting referen REF U.S. Government, The PATRIOT Act Tania Martin, Research Note 32: Advanced Persistent Threats - Etat de l'art OWASP, The OWASP Project Kristof Verslype, Quick Review 65: BoxCryptor - Client-side encryptie voor FSS Kristof Verslype, Research Note 26: Security Information & Event Management (SIEM) Tania Martin, Social engineering : watch out because there is no patch for human stupidity Belgian social security, Politique de sécurité relative à des services de Cloud Computing Belgian social security, Policy dataclassification Smals Research, Modèle d évaluation de sécurité cloud Smals Research, Cloud security evaluatiemodel 65/66

Tania Martin 02 787 56 05 tania.martin@smals.be Smals www.smals.be @Smals_ICT www.smalsresearch.be @SmalsResearch 66/66