Implicaciones para. CISA, CISM, CGEIT, CRISC, CISSP, OSCP, Cobit FC, ITIL v3 FC



Similar documents
Cloud Security Who do you trust?

Cloud Security Who do you trust?

Cloud Security: The Grand Challenge

Security and Cloud Computing

New Risks in the New World of Emerging Technologies

Healthcare: La sicurezza nel Cloud October 18, IBM Corporation

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Security and Cloud Computing

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

CLOUD SECURITY: THE GRAND CHALLENGE

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Cloud Computing. Benefits and Risks. Bill Wells, CISSP, CISM, CISA, CRISC, CIPP/IT

Managing Cloud Computing Risk

Cyber Security Symposium 2015 September 29,2015

CISA, CISM, CGEIT, CRISC COBIT Foundations Certificate CISSP, OSCP ITIL v3 Foundations Certificate

Cloud Security and Managing Use Risks

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Cloud Security - Risiken und Chancen Dr. Matthias Schunter, MBA IBM Research Zürich, schunter@acm.org

How To Secure Cloud Infrastructure

How To Protect Your Cloud From Attack

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

John Essner, CISO Office of Information Technology State of New Jersey

Security Controls What Works. Southside Virginia Community College: Security Awareness

IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet

Strategies for assessing cloud security

How To Protect Your Cloud Computing Resources From Attack

Data Protection: From PKI to Virtualization & Cloud

Consolidated security management for mainframe clouds

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

IBM EXAM QUESTIONS & ANSWERS

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Securing the Service Desk in the Cloud

05.0 Application Development

Architecting the Cloud

Security Officer s Checklist in a Sourcing Deal

Haciendo Inteligente mi movilidad. Ing. Miguel Angel Aranguren Romero CISA, CISM, CGEIT, CRISC Cobit Foundations Certificate

Key Considerations of Regulatory Compliance in the Public Cloud

Cloud Security Trust Cisco to Protect Your Data

AUDIT LOGGING/LOG MANAGEMENT

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

Cloud Computing for SCADA

Injazat s Managed Services Portfolio

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story

SECURING HEALTH INFORMATION IN THE CLOUD. Feisal Nanji, Executive Director, Techumen

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

Safeguarding the cloud with IBM Security solutions

Cloud computing White paper November IBM Point of View: Security and Cloud Computing

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

How To Teach A Security Manager

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

EAaaS Cloud Security Best Practices

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Keyfort Cloud Services (KCS)

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

IBM PowerSC. Security and compliance solution designed to protect virtualised data centres. Highlights. IBM Systems and Technology Data Sheet

Safeguarding the cloud with IBM Dynamic Cloud Security

Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc.

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services

HIPAA/HITECH Compliance Using VMware vcloud Air

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Data Masking Best Practices

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Cloud Computing Governance & Security. Security Risks in the Cloud

CloudCheck Compliance Certification Program

Top 10 Risks in the Cloud

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

IBM Security in the Cloud

Security Issues in Cloud Computing

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

GoodData Corporation Security White Paper

Public Cloud Service Definition

Estrategias para la Reducción de Riesgos y Ciber Ataques

Cloud computing is a new consumption and delivery model. Yesterday Today

Cloud Security Introduction and Overview

How To Protect Yourself From A Hacker Attack

Cloud Computing: Risks and Auditing

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Cisco Advanced Services for Network Security

Achieving Compliance with the PCI Data Security Standard

Cloud Computing: Legal Risks and Best Practices

VMware vcloud Architecture Toolkit Public VMware vcloud Service Definition

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

VMware vcloud Service Definition for a Public Cloud. Version 1.6

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

Protect Root Abuse privilege on Hypervisor (Cloud Security)

HOW SECURE IS YOUR PAYMENT CARD DATA?

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

The Benefits of an Integrated Approach to Security in the Cloud

Transcription:

La computación en nube Implicaciones para Auditoría y Seguridad d Ing. Miguel Angel Aranguren Romero Ing. Miguel Angel Aranguren Romero CISA, CISM, CGEIT, CRISC, CISSP, OSCP, Cobit FC, ITIL v3 FC

Introducción

A smarter planet creates new opportunities, but also new risks. The planet is becoming more instrumented, interconnected and intelligent. New possibilities New complexities New risks We have seen more change in the last 10 years than in the previous 90. Ad J. Scheepbouwer, CEO, KPN Telecom Critical Privacy New and Cloud infrastructure and identity emerging threats security protection

De las cinco tecnologías evaluadas, las redes sociales, las plataformas móviles y la computación en nube presentan las mayores preocupaciones de riesgos Herramientas de redes sociales Plataformas móviles. Computación en nube 21% 15% 27% 19% 24% 35% 42% 54% 64% Estamos preocupados por tener capacidad para controlar de manera segura el flujo de datos hacia y desde los dispositivos móviles de los empleados y de almacenarlos con seguridad Fabricación, América del Norte 26% Virtualización 31% Arquitectura 25% orientada a servicios 34% 43% 42% Ya estamos examinando la computación en nube y aún no se ha perfeccionado la seguridad en nuestras propias redes locales. Asistencia Medica, América del Norte Extremadamente riesgoso / riesgoso Algo riesgoso Moderadamente riesgoso / sin ningún riesgo Fuentes: The Economist Intelligence Unit and IBM Institute for Business Value (556 encuestados). Q17 ( Cuán grande es el riesgo de las siguientes tecnologías y herramientas para su empresa?)

Regardless of the model public, private or hybrid security remains the top concern for cloud adoption. 1 80 percent How can we be assured that our data will not be of enterprises consider security the number one inhibitor to cloud adoptions leaked and that the vendors have the technology and the governance to control its employees from stealing data? 48 percent of enterprises are concerned about the reliability of clouds Security is the biggest concern. I don t worry much about the other ities reliability, availability, etc. 33 percent of respondents are concerned with cloud interfering with their ability to comply with regulations I prefer internal cloud to IaaS 1. When the service is kept internally, I am more comfortable with the security that it offers. 1 Driving Profitable Growth Through Cloud Computing, IBM Study (conducted by Oliver Wyman), March, 2010

Terminología

Cloud defined: a consumption and delivery model optimized by workload. Cloud is an emerging style of computing that uses consumption and delivery models to provide applications, data and IT resources as services to users over the network Cloud allows: Self service Sourcing options Flexible payment models Economies of scale Cloud represents: The industrialization of delivery for IT supported services Cloud is: A business model An infrastructure and management methodology A user experience Cloud lets you manage large numbers of highly virtualized resources that resemble a single large resource which can be used to deliver services.

Cloud computing delivery models include private, hybrid and public. Private: Access limited to enterprise and its partner network Dedicated resources Single tenant Drives efficiency, standardization and best practices while retaining greater customization ti and control Might be managed or hosted by third party Cloud services Cloud computing model Hybrid: Private infrastructure, integrated with public cloud Public: Open access, subject to subscription Shared resources Multiple tenants Delivers select set of standardized business process, application or infrastructure services on a flexible price per use per basis Always managed and hosted by a third party Customization, efficiency, availability, resiliency, security and privacy Standardization, capital preservation, flexibility and time to deploy

Las bondades de la computación en nube

Las bondades de la computación en nube

Enterprises are benefitting from cloud computing in tangible and significant ways. Results from cloud computing engagements From: To: Increased speed and flexibility 1 Test provisioning Weeks Minutes Change management Months Days or hours Release management Weeks Minutes Service access Administered Self service Standardization Complex Reuse and share Metering and billing Fixed cost Variable cost Server and storage tili ti 10 to 20 t Reduced costs 1 utilization percent 70 to 90 percent Payback period Years Months 1 Based on IBM and client engagement experience

The View of Cloud Computing Cloud is a new consumption and delivery model inspired by consumer Internet services. Cloud is enabled by: Pooling and virtualization of resources Automation of service management Standardization of workloads Cloud Services Cloud enables: Self service Location independence d Flexible payment models Economies of scale Cloud represents: The industrialization of delivery for IT supported services Software Hardware Storage Networking

Las dificultades de implementación

Las dificultades de implementación

Control Manycompanies and governments are uncomfortable with the idea of their information located on systems they do not control. Providers must offer a high degree of security transparencyto to help put customersat ease. Compliance Complying with SOX 1, HIPAA 2 and other regulations may prohibit the use of clouds for some applications. Comprehensive auditing capabilities are essential. Data Migrating workloads to a shared network and compute infrastructure increases the potential for unauthorized exposure. Authentication and access technologies become increasingly important. Reliability High availability will be a key concern. IT departments will worry about a loss of service should outages occur. Mission critical applications may not run in the cloud without strong availability guarantees. Management Providers must supply easy controls to manage firewall and security settings for applications and runtime environments in the cloud.

One size does not fit all: Different cloud workloads have unique risk profiles. for security assurance Need High Low Training and testing with non sensitive data Analysis and simulation with public data Mission critical workloads, personal information Tomorrow s high value and high risk workloads need: Quality of protection adapted to risk Direct visibility and control Significant level of assurance Today s clouds are primarily here: Lower risk workloads One size fits all approach to data protection No significant assurance Price is key Low risk Mid risk High risk Business risk

Perspectiva de auditoría y seguridad Implicaciones i y recomendaciones

Preparing to Move to the Cloud Cloud Computing is complex where to begin: is complex where to begin: Cloud Computing Establish a set of objectives that clarify what a successful engagement in the cloud would look like. If externally hosting your cloud ensure that your vendor is reliable Identify what workloads you are most comfortable Identify what workloads you are most comfortable with don t just dive in. Determine the appropriate security for your workload, and leverage managed services where workload, and leverage managed services where possible

Multiple Delivery Models and Security Impacts Delivery Models provide context into who is responsible for each clouds security

Governance Jurisdiction and regulatory requirements Can data be accessed and stored at rest within regulatory constraints? Aredevelopment, test and operational clouds managing data within the required jurisdictions including backups? Complying with Export/Import controls Applying encryption software to data in the cloud, are these controls permitted in a particular country/jurisdiction? Can you legally operate with the security mechanisms being applied? Compliance of the infrastructure Are you buying into a cloud architecture/infrastructure/ service which is not compliant? Audit and reporting Can you provide the required evidence and reports to show compliance to regulations such as PCI and SOX? Can you satisfy legal requirements for information when operating in the cloud?

Data Data location and segregation Where does the data reside? d? How do you know? What happens when investigations require access to servers and possibly other people s data? Data footprints How do you ensure that the data is where you need it when you need it, yet not left behind? How is it deleted? Can the application code be exposed in the cloud? Backup and recovery How can you retrieve data when you need it? Can you ensure that the backup is maintained securely, in geographically separated locations? Administration How can you control the increased access administrators have working in a virtualized model? Can privileged access be appropriately p controlled in cloud environments?

Protection Architecture How do you protect against attack when you have a standard infrastructure and the same vulnerability exists in many places across that infrastructure? Hypervisor vulnerabilities How can you protect the hypervisor (a key component for cloud infrastructures) which interacts and manages multiple environments in the cloud? The hypervisor being a potential target to gain access to more systems, and hosted images. Multi tenant t tenvironments How do you ensure that systems and applications are appropriately and sufficiently isolated and protecting against malicious server to server communication? Security policies How do you ensure that security policies are accurately and fully implemented across the cloud architectures you are using and buying into? Identity Management How do you control passwords and access tokens in the cloud? How do you federate identity in the cloud? How can you prevent user IDs/passwords being passed and exposed in the cloud unnecessarily, increasing risk?

67% of all web application vulnerabilities had no patch in 2009. Source: IBMSecurity SolutionsX Force 2009 Trend and Risk Report, published Feb 2010. Applications Software Vulnerabilities How do you check and manage vulnerabilities in applications? How do you secure applications in the cloud that are increasing targets due to the large user population? Patch management How do you secure applications where patches are not available? How do you ensure images are patched and up to date when deployed in the cloud? Application devices How do you manage the new access devices using their own new application software? How do you ensure they are not introducing a new set of vulnerabilities and ways to exploit your data?

Assurance Operational oversight When logs no longer just cover your own environment do you need to retrieve and analyse audit logs from diverse systems potentially containing information with multiple customers? Audit and assurance What level ofassurance and how many providers will you need to deal with? Do you need to have an audit of every cloud service provider? Investigating an incident How much experience does your provider have of audit and investigation in a shared environment? How much experience do they have of conducting investigations without impacting service or data confidentiality? Experience of new cloud providers What will the security of data be if the cloud providers are no longer in business? Has business continuity been considered for this eventuality?

Mejores Prácticas

Propuesta Metodológica

Iniciando 1. Define a cloud strategy with security in mind Identify the different workloads and how they need to interact. Which models are appropriate based on their security and trust requirements and the systems they need to interface to? 2. Identify the security measures needed Using a framework Security, allows teams to capture the measures that are needed in areas such as governance, architecture, applications and assurance. 3. Enabling security for the cloud. The upfront set of assurance measures you will want to take. Assessing that the applications, infrastructure and other elements meet your security requirements, as well as operational security measures.

Propuesta Metodológica 1. Implement and maintain a security program. 2. Build and maintain a secure cloud infrastructure. 3. Ensure confidential data protection. 4. Implement strong access and identity management. 5. Establish application and environment provisioning. 6. Implement a governance and audit management program. 7. Implement a vulnerability and intrusion management program. 8. Maintain environment testing and validation.

Conclusiones y Reflexiones finales

Conclusiones y reflexiones finales Cloud computing offers new possibilities and new challenges. hll These challenges range from governance, through to securing application and infrastructure. Fundamentally it is important to be able to assure the security of these new models in order to build trust and confidence. The key to establishing trust in these new models is choosing the right cloud computing model for your organization. Place the right workloads in the right model with the right security mechanisms. For those planning to consume cloud services looking for trust and assurance from the cloud provider; understanding the service level agreements and the approaches to security is key. Assessing that this can be delivered, including what assurances can be provided will be important. For those providing or building a cloud infrastructure, using a proven methodology and technologies that can deliver appropriate security is key. This is not just a technical challenge but a challenge of governance and compliance; applications and infrastructure; and assurance.

GRACIAS!!! Ing. Miguel Angel Aranguren Romero CISA, CISM, CGEIT, CRISC Cobit Foundations Certificate CISSP, OSCP ITIL v3 Foundations Certificate marangur@co.ibm.com Miguel.aranguren@gmail.com Miguel.aranguren@isaca.org.co