IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011



Similar documents
OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Security & Trust in the Cloud

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

Cloud Computing. IST 501 Fall Dongwon Lee, Ph.D.

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Open Source and Cloud. Ramesh Kumar

Cloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com

Objectives. To understand Cloud Computing Issues. Foundational Elements of Cloud Computing Security & Privacy Cloud Migration Paths Risks in Cloud

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Security Issues in Cloud Computing

Architecting the Cloud

Cloud Models and Platforms

DISTRIBUTED COMPUTER SYSTEMS CLOUD COMPUTING INTRODUCTION

Cloud Computing for SCADA

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

OVERVIEW Cloud Deployment Services

The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD. Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST


Managing Cloud Computing Risk

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Cloud Computing; What is it, How long has it been here, and Where is it going?

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

TOP 7 THINGS Every Executive Should Know About Cloud Computing EXECUTIVE BRIEF

Clinical Trials in the Cloud: A New Paradigm?

How To Protect Your Cloud Computing Resources From Attack

Information Technology: This Year s Hot Issue - Cloud Computing

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

How To Understand Cloud Computing

Cloud Computing An Elephant In The Dark

Fundamental Concepts and Models

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

Effectively and Securely Using the Cloud Computing Paradigm. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Security Considerations for Public Mobile Cloud Computing

CompTIA Cloud+ 9318; 5 Days, Instructor-led

Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Cloud Security: The Grand Challenge

Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014

ISSN: (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies

John Essner, CISO Office of Information Technology State of New Jersey

Cloud Computing. Karan Saxena * & Kritika Agarwal**

Cloud Security. DLT Solutions LLC June #DLTCloud

21/09/11. Introduction to Cloud Computing. First: do not be scared! Request for contributors. ToDO list. Revision history

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

INTRODUCTION THE CLOUD

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

Seeing Though the Clouds

A white paper from Fordway on CLOUD COMPUTING. Why private cloud should be your first step on the cloud computing journey - and how to get there

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

Cloud Computing and Standards

Incident Handling in the Cloud and Audit s Role

The Elephant in the Room: What s the Buzz Around Cloud Computing?

Cloud Security Introduction and Overview

Remote Voting Conference

BUSINESS MANAGEMENT SUPPORT

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

Secure Cloud Computing through IT Auditing

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes

CLOUD COMPUTING. A Primer

Planning the Migration of Enterprise Applications to the Cloud

How to ensure control and security when moving to SaaS/cloud applications

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

A Comparative Study of cloud and mcloud Computing

vcloud Virtual Private Cloud Fulfilling the promise of cloud computing A Resource Pool of Compute, Storage and a Host of Network Capabilities

Top 10 Cloud Risks That Will Keep You Awake at Night

Windows Azure Platform

Cloud Security and Managing Use Risks

Private Cloud Database Consolidation with Exadata. Nitin Vengurlekar Technical Director/Cloud Evangelist

A Survey on Cloud Security Issues and Techniques

Cloud Courses Description

IJRSET 2015 SPL Volume 2, Issue 11 Pages: 29-33

CLOUD COMPUTING PHYSIOGNOMIES A 1.1 CLOUD COMPUTING BENEFITS

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Cloud Computing Technology

Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University

How To Manage A Cloud System

VMware vcloud Architecture Toolkit Public VMware vcloud Service Definition

How cloud computing can transform your business landscape

Module 1: Facilitated e-learning

Transcription:

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

Cloud Basics

Cloud Basics The interesting thing about cloud computing is that we've redefined cloud computing to include everything that we already do. I don't understand what we would do differently in the light of cloud computing other than change the wording of some of our ads. Larry Ellison CEO Oracle

Cloud Basics Cloud Computing NIST Definition: A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction There are Public and Private clouds

Cloud Basics Five Key Cloud Attributes: 1. Shared / pooled resources 2. Broad network access 3. On-demand self-service 4. Scalable and elastic 5. Metered by use

Cloud Basics One of the most distinguishing characteristics of cloud computing architecture is its close dependency on the hardware components. An online application is just a simple application that could be launched in different servers but when the application is considered with cloud computing, it will require massive data centers that will ensure the processes are done as expected and timely. Exforsys Inc. Large Requirements for Dependability, Availability, and Performance Bandwidth Housing Hardware and Software Performance Competency of the Service Provider Certified Security

Cloud Basics Have to have acronyms: SaaS (Software as a Service): Are applications that are used in the cloud by different enterprise. They already have predefined functions and the enterprise would only need to adapt to these functions. PaaS (Platforms as a Service): Provides the basic platform wherein developers and the enterprise have to design from the scratch or the preloaded functions. IaaS (Infrastructure as a Service): Consumer can provision computing resources within provider's infrastructure upon which they can deploy and run arbitrary software, including OS and applications

Cloud Basics IBM Cloud Service Reference Architecture [2]

Cloud Risk Components...Providers Many companies are uncomfortable with the idea of their information located on systems they do not control. Providers must offer a high degree of security transparency to help put customers at ease. Customers want to outsource IT Security to cloud provider Migrating workloads to a shared network and compute infrastructure increases the potential for unauthorized exposure. Authentication and access technologies become increasingly important. Providers must supply easy, visual controls to manage firewall and security settings for applications and runtime environments in the cloud. IT Security is not brought into the decision of how & when the company uses clouds High availability will be a key concern.

Cloud Risk Components...Users Above everything else, cloud computing must protect its users. There are two ways to ensure cloud computing security: restrictive user access and certifications. Restrictive access Applications in cloud computing should use more than private infrastructure access controls. Like what? Certifications are also important for user certification. Developers have to open their application to security specialists or companies that provide certifications for security to assure users that the application has been fully tested against different types of attacks.

Cloud Risk Components...Developers Vision - Security as a Service Goal - Automate compliance through security services provided by cloud provider Security APIs/tools mapped to specific controls Customers could subscribe to tools/services to meet compliance requirements When setting up new project in cloud Customers assert nature of data they will use Cloud responds with list of APIs/tools for customers to use

Cloud Security Architecture Cloud architecture abstracts resources at several levels Application and operating system level via images and hypervisors Hardware location level via compute manager and compute nodes Network level (via virtual networks, VLANs, VPNs) Each cloud service type needs an architecture that will optimize that type of service delivery

Hybrid Cloud Management, Security and Integration From the Enterprise Client s perspective: Management of workloads running offpremise on clouds Trusted Cloud Security for Hybrids Public Cloud Control security and resilience of services (identity management, compliance, isolation) Integration (Connectivity) of hybrid applications & information On-premise to off-premise business application connectivity & governance Information exchange across the enterprise and clouds Enterprise Resources Enterprise Management, & Governance of Cloud software, applications, workload

Cloud Security Architecture Identity Management and Provisioning Network security services Secure by default User/process rights management Fine-grained application privileges Role-based access control (RBAC) for administration Multi-level security and Mandatory Access Control Cryptographic service (for traffic and data when necessary)

Cloud Security Architecture With cloud, you lose a little bit of physical control but not your ownership Design with Security in mind Create distinct Security Groups for each application layer Use group-based rules for controlling access between layers Restrict external access to specific IP ranges Encrypt data at-rest if needed Encrypt data in-transit (SSL) Consider encrypted file systems for sensitive data Use MultiFactor Authentication

Cloud Foundations - Internet Network technologies are making the cloud concept a viable computing model Comes from the early days of the Internet where we drew the network as a cloud we didn t care where the messages went the cloud hid it from us Kevin Marks, Google It is what we might really want the cloud to be. We don t really want to care what or how it happens as long as we get our services and information.

Cloud Model Best Fit Private cloud - enterprise owned or leased Community cloud - shared infrastructure for specific community Public cloud - Sold to the public, mega-scale infrastructure Hybrid cloud - composition of two or more clouds

Part 2

Cloud Inevitability Dan Farber, Editor in Chief CNET News We are at the beginning of the age of planetary computing. Billions of people will be wirelessly interconnected, and the only way to achieve that kind of massive scale usage is by massive scale, brutally efficient cloud-based infrastructure. Tim O Reilly, CEO O Reilly Media I think it is one of the foundations of the next generation of computing The network of networks is the platform for all computing Everything we think of as a computer today is really just a device that connects to the big computer that we are all collectively building

Cloud Components Controls and Security OSA IT security architecture patterns

Cloud Outsourcing (www.jerichoforum.org)

Cloud Outsourcing Security Relevant Cloud Components Cloud Provisioning Services Cloud Data Storage Services Cloud Processing Infrastructure Cloud Support Services Cloud Network and Perimeter Security Elastic Elements: Storage, Processing, and Virtual Networks

Cloud Outsourcing Advantages Rapid reconstitution of services Enables availability - Provision in multiple data centers / multiple instances (you might not be able to afford that on your own) Advanced honey net capabilities Challenges Impact of compromising the provisioning service

Cloud Outsourcing If you are not an IT company why spend so much on it? Negotiate your IT Infrastructure services in the cloud And maybe your applications too ( if they are out of the box) Just pay for what you need (can you really afford a firewall guy?) Do only what you have to internally (custom applications or trade secrets) You have to trust someone else for most of your IT Security services (but maybe they can do it better and more efficiently than you?)

Cloud In sourcing High density virtual systems are proving to be more efficient and cost effective than banks of hundreds or thousands of servers Private clouds are proving to be easier to manage (if well understood) and very flexible They are still only as secure as your security skill sets allow

Cloud Risk Expectations Sun Microsystems CTO Greg Papadopoulos Users will trust service providers with their data like they trust banks with their money Hosting providers [will] bring brutal efficiency for utilization, power, security, service levels, and idea- todeploy time CNET article Becoming cost ineffective to build data centers Organizations will rent computing resources Envisions grid of 6 cloud infrastructure providers linked to 100 regional providers (ha ha ha ha ha!!!!!) a little too optimistic for me

Cloud Risk Expectations https://cloudsecurityalliance.org/csaguide.pdf

Cloud Privacy and Compliance Issues with moving PII and sensitive data to the cloud Privacy impact assessments Using SLAs to obtain cloud security Suggested requirements for cloud SLAs Issues with cloud forensics Contingency planning and disaster recovery for cloud implementations Handling compliance FISMA HIPAA SOX PCI SAS 70 Audits

Cloud Privacy and Compliance

Cloud IT Architecture for Security

Cloud IT Architecture for Security

Cloud IT Architecture for Security Some key issues: trust, multi-tenancy, encryption, compliance Clouds are massively complex systems can be reduced to simple primitives that are replicated thousands of times and common functional units Cloud security is a tractable problemthere are both advantages and challenges Former Intel CEO, Andy Grove: only the paranoid survive

Cloud IT Architecture for Security General Security Advantages Shifting public data to a external cloud reduces the exposure of the internal sensitive data Cloud homogeneity makes security auditing/testing simpler Clouds enable automated security management Redundancy / Disaster Recovery

Cloud IT Architecture for Security General Security Challenges Trusting vendor s security model Customer inability to respond to audit findings Obtaining support for investigations Indirect administrator accountability Proprietary implementations can t be examined Loss of physical control