Security and Compliance in Clouds: Challenges and Solutions



Similar documents
Security und Compliance in Clouds

Compliance in Clouds A cloud computing security perspective

Security and Compliance in Clouds

Security and Compliance in Clouds

Cloud-Security: Show-Stopper or Enabling Technology?

Security & Trust in the Cloud

Cloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

Architecting the Cloud

Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken )

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Cloud Courses Description

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Managing Cloud Computing Risk

Cloud Computing. Cloud computing:


How to ensure control and security when moving to SaaS/cloud applications

Security Considerations for Public Mobile Cloud Computing

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

CHAPTER 8 CLOUD COMPUTING

The Private Cloud Your Controlled Access Infrastructure

Cloud computing: benefits, risks and recommendations for information security

Security Issues in Cloud Computing

Expert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Cloud Essentials for Architects using OpenStack

BUSINESS MANAGEMENT SUPPORT

Cloud Computing: Background, Risks and Audit Recommendations

Fujitsu Dynamic Cloud Bridging today and tomorrow

Cloud Security Specialist Certification Self-Study Kit Bundle

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Deploying a Geospatial Cloud

CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD. Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas

Top 10 Cloud Risks That Will Keep You Awake at Night

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

Cloud Courses Description

CloudCheck Compliance Certification Program

A Secure System Development Framework for SaaS Applications in Cloud Computing

How To Manage Cloud Data Safely

Clo l ud d C ompu p tin i g

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Cloud Computing. Chapter 1 Introducing Cloud Computing

D. L. Corbet & Assoc., LLC

CLOUD COMPUTING SECURITY

Data Protection Act Guidance on the use of cloud computing

How To Protect Your Cloud Computing Resources From Attack

Cloud models and compliance requirements which is right for you?

Cloud Computing. Chapter 1 Introducing Cloud Computing

Production in the Cloud

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

Cloud Security Introduction and Overview

Cloud Computing: The Next Computing Paradigm

Chapter 1: Introduction

Realizing the Value Proposition of Cloud Computing

The HIPAA Security Rule: Cloudy Skies Ahead?

NCTA Cloud Architecture

Tips For Buying Cloud Infrastructure

Cloud Computing An Elephant In The Dark

Certified Cloud Computing Professional VS-1067

Cloud Computing. What is Cloud Computing?

ISSN: (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies

Clinical Trials in the Cloud: A New Paradigm?

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

How To Secure Cloud Computing

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Private Cloud Database Consolidation with Exadata. Nitin Vengurlekar Technical Director/Cloud Evangelist

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Key Considerations of Regulatory Compliance in the Public Cloud

Pharma CloudAdoption. and Qualification Trends

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

Evaluating IaaS security risks

Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014

Hybrid Cloud Computing

Cloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

NIST Cloud Computing Reference Architecture & Taxonomy Working Group

EXIN Cloud Computing Foundation

Seeing Though the Clouds

New Requirements for Security and Compliance Auditing in the Cloud

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

The Need for Service Catalog Design in Cloud Services Development

Transcription:

Security and Compliance in Clouds: Challenges and Solutions Prof. Dr. Jan Jürjens Fraunhofer Institut für Software- und Systemtechnologie ISST, Dortmund http://jan.jurjens.de

This Talk What are the challenges? What are the solutions? What are the tools? 2

The NIST Cloud Definition Framework Hybrid Clouds Deployment Models Private Cloud Community Cloud Public Cloud Service Models Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Essential Characteristics On Demand Self-Service Broad Network Access Rapid Elasticity Resource Pooling Measured Service Massive Scale Resilient Computing Common Characteristics Homogeneity Virtualization Low Cost Software Geographic Distribution Service Orientation Advanced Security 2 3 (Source: NIST, Effectively and Secure using the Cloud Paradigm, 2009)

Security is the Major Issue 4

Cloud Security Goals Confidentiality Availability Integrity Authenticity Non Repudiation Privacy Data processing in the cloud is still unencrypted Encrypted data storage in the cloud: Shared DB Encrypted data exchange with the cloud: Secure Internet Link Protection of the virtual space of the clouds from e.g. overwrites Redundant clouds / data storage Prevent unwanted and unrecognized data modification in the cloud Authentication of cloud systems to users and vice versa! Business transactions in clouds require signatures Independent checks of the signatures Prevent user profiling Conflicting with Non Repudiation 5

Cloud Computing Security Issues Mistakes/Attacks from employees of the provider Attacks from other customers Attacks on the availability Mistakes in the provisioning and the management Misuse of the provider platform Web-Service based attacks (Source: BSI, IT-Grundschutz und Cloud Computing, 2009) 6

Compliance Compliance is the adherence to regulations (e.g. legal or governance regulations). The automated verification of security goals supports the build up of trust between a cloud vendor and its customers. Compliance checks can also verify the business processes of a cloud user for legal issues: SOX, EURO-SOX,BASEL II, SOLVENCY II Business process compliance is possible in two ways: Compliance by design, Compliance generation Compliance validation 7

Compliance: Importance and Challenges Implementation of compliance regulations is essential: Implementation of EU-Guidelines Basel II (=> III), Solvency II Implementation of MaRisk from BaFin US-market actors require SOX Today: time-consuming and expensive manual labour Specialists are employed for standard tasks and there is often no time for analysis of special cases e.g. risk of fraud by stuff (spectacular example: Societe Generale 2008: 5 Mrd. Euro loss). Challenge: how to reduce the manual effort and provide time for GRC experts to focus on difficult issues? 8

GRC in Clouds Governance Risk Compliance Policy design Classification schema for data and processes Trust chain in a cloud Risk strategy Business Impact Analysis Threat and Vulnerability Analysis Risk Analysis Remediation Policy enforcement Legal compliance (SOX, SOLVENCY II) Control implementation The Cloud offers dynamic ressource allocation For GRC in clouds we require the same dynamic 9

Compliance Scenarios Customer -> Cloud: Security Compliance: Check the security processes of the cloud for compliance with SLA Legal Compliance: Check the business process for SOX, MaRisk compliance Cloud -> Cloud: Contract Compliance: Check the interaction of two business partners in the cloud Cloud -> Customer: Security Compliance: Inspect the processes for cloud behavior violation 10

Security vs. GRC Governance, Risk und Compliance (GRC) Governance: internal company guidelines Compliance: external guidelines, e.g. SOX, EURO-SOX, BASEL II, SOLVENCY II Risk: risk management under consideration of all guidelines Security Abstract security objectives, e.g. CIA applied to a company Security and compliance are closely related but different. 11

Security vs. Compliance: Regulations and Standards Abstract laws and regulations Concrete security policy rules SOX AktG KWG VAG MARisk Basel II ISO 2700x Solvency II BSI-Grundschutzhandbuch 12

This Talk What are the challenges? What are the solutions? What are the tools? 13

Service Level Agreements (SLA) Precise description of the offered services and the expected limitations! Compare different SLAs for my needs. Does a cloud vendor offer an SLA at all? What do the numbers mean: 99.8% per anno availability: ~ 17,5 hours per year the cloud is offline! What are the penalties for SLA violations? Can I monitor the performance of the cloud? Does an early warning system exist? Is the cloud segregated into different security levels? Do I need to separate my data before giving it to the cloud? Should I avoid top secret data to enter the cloud? 14

A Simple Cloud Check List Is the security of the vendor documented? How are security levels maintained? Is it possible to withdraw from the cloud with little effort? What Guarantees / Service Level Agreements (SLA) exist? Can they be tailored to the customers need? Which penalties are in the standardized SLAs? How can the vendor enforce an SLA? What kind of cloud monitoring capabilities exist? Where is the physical location of the cloud? Which laws apply there? Can I enforce the usage of German law ( Rechtswahl )? Are German privacy laws enforced? 15

Some Example Considerations Physical security of the data center: Googles Security Operations Center Amazon: Two factor authentication Attacks on the networks level, e.g., Denial-of-Service: Amazon uses Denial-of-Service Prevention, but the method is secret Microsoft uses Load-Blanacer and Intrusion Prevention Systems Backup Solutions: Goole, Amazon execute Backups on different physical locations FlexiScale executes Backups, but users cannot retrieve lost data Amazon stores data permanent after 5 Minutes it is in the cloud 16

Some Examples: Security Certificates Vendor X X 17 (Source: Fraunhofer SIT, Cloud Computing Sicherheit, 2009)

Compliance: Towards a Solution How to automate standard GRC tasks? RoI reduction through manual work reduction Experts focus on special cases How to develope GRC information base for a company? Data sources: Interviews, texts, process mining, and processes How to organize risk management concept evaluation? Ideally (partially) tool-automated How to support GRC monitoring? Implementation of monitoring tools e.g. in web portals Ideally: reuse information for business process optimization 18

Related Standards Process Maturity Holistic Control Systems Security Standards Transparency Safe Harbor 19

This Talk What are the challenges? What are the solutions? What are the tools? 20

What are the Tools? Which tool-support is available for: Analyzing one's own business process for suitability of outsourcing into a cloud (wrt. security / compliance) Analyzing / monitoring a cloud providers (claimed) security / compliance guarantees Possibilities: Log-data analysis Business process mining Business process analysis 21

Log-File Analysis Four-Eyes-Principle Identification of the Four- Eyes-Principle with the help of the following information: Request Ids are conform Owners are different Job was finished at the same point in time 22 22

Business Process Mining Analysis of processes derived with reverse engineering A X C B Process ID Activity ID Consultant Time Stampe 1 A John 9-3-10:15.01 2 A Mike 9-3-10:15.12 Event dates 3 B Mike 9-3-10:16.07 4 C Carol 9-3-10:18.25 ERP SCM WfMS... CRM 23

Business Process Analysis Automated compliance-analysis Two approaches: 1. Text-based analysis of the activity identifier for the automated risk identification 2. Structural analysis of the process model for compliance-violationpattern 24

SecureClouds Project (http://secureclouds.de) Tool supported method for implementing business processes to IT infrastructure under consideration of compliance policy requirements (like Basel II, Solvency II,...). Analysis is performed on the basis of text documents, models or other data sources Governance, Risk and Compliance (GRC) and measures especially for Cloud Computing for SMEs and large-scale enterprises. 25

Tool-based Analysis and Enforcement for Security & Compliance Abstract laws and regulations Concrete security policy rules Basel II SOX AktG KWG VAG MARisk ISO 2700x Solvency II BSI-Grundschutzhandbuch SecureClouds tools Risk finder Compliance pattern analyzer 26

The SecureClouds Framework 27

Benefit Automatically generated compliance report: For example: Compliant wrt: MaRISK VA (yes / no) Lists requirements that may need further investigation Suggests measurements to improve alignment with compliance requirements: Compliance Report automated correction manual correction Compliance: incomplete Issue: - MaRISK VA 7.2: Accordance to BSI G3.1 needs investigation Measure: - BSI Maßnahmenkatalog M 2.62 28

Services Offered by Fraunhofer ISST Preparation of compliance reports using automated tools Data mining of log files Compliance analysis of business process execution Automated process model generation Security & compliance analysis of business processes on the basis of process documentation Preparation and execution of compliance checks NB: Possibility for public financial support as pilot customers in funded projects. 29

Some Client Projects German electronic health card architecture (Gesundheitskarte) Mobile architectures and policies (O2 (Germany)) Digital file store (HypoVereinsbank) Common Electronic Purse Specifications (global standard for electronic purses, Visa International) Intranet information system (BMW) Return-on-Security Investment analysis (Munich Re) Digital signature architecture (Allianz) IT security risk assessment (Infineon) Smart-card software update platform (Gemalto) Cloud security ceritification (TÜV-IT, Itesys, LinogistiX) Cloud user security assessment (admeritia, LinogistiX) 30

Conclusion Security & compliance in cloud-based environments is a complex and diverse issue. As diverse as clouds themselves (cf NIST definition) There are solutions (and tools) available to tackle the challenges. Analyzing one's own business process for suitability of outsourcing into a cloud (wrt. security / compliance) Analyzing / monitoring a cloud provider's (claimed) security / compliance guarantees Contact: http://jan.jurjens.de Information: http://www.isst.fraunhofer.de/geschaeftsfelder/ insuranceandfinance/refpro/gruppe-apex 31