CJIS in the Cloud. Oregon State Police CJIS Statewide Training September 23 & 24, 2015



Similar documents
Virtualization Demystified

CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS.

Alan Ferretti CJIS Information Security Officer

CJIS Information Technology Security Audit (ITSA) 2015 Program Update

Information Technology: This Year s Hot Issue - Cloud Computing

Cloud Computing Overview

Alan Ferretti CJIS Information Security Officer

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Cloud Computing An Elephant In The Dark

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Security Overview Enterprise-Class Secure Mobile File Sharing

CLOUD COMPUTING: WHAT YOU SHOULD KNOW

GENERAL ORDER DISTRICT OF COLUMBIA I. BACKGROUND

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

Cloud Courses Description

Physical Protection Policy Sample (Required Written Policy)

Cloud Courses Description

NONCRIMINAL JUSTICE AGENCY USE OF CRIMINAL JUSTICE INFORMATION

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Managing Cloud Computing Risk

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

AVLOR SERVER CLOUD RECOVERY

CJIS VENDOR AGREEMENT CJIS COMPUTER SYSTEMS COLORADO BUREAU OF INVESTIGATION

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

Criminal Justice Information Services (CJIS) Security Policy

Seeing Though the Clouds

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

BBM Protected Secure mobile

The Elephant in the Room: What s the Buzz Around Cloud Computing?

How to ensure control and security when moving to SaaS/cloud applications

Cloud Computing; What is it, How long has it been here, and Where is it going?

Criminal Justice Information Services (CJIS) Security Policy

Cloud models and compliance requirements which is right for you?

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Introduction to Cloud Services

A COMPLETE GUIDE HOW TO CHOOSE A CLOUD-TO-CLOUD BACKUP PROVIDER FOR THE ENTERPRISE

Credit Unions and The Cloud. By: Chris Sachse

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

SAP HANA Cloud Platform Frequently Asked Questions - Business

NCTA Cloud Architecture

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Security Issues in Cloud Computing

Kent State University s Cloud Strategy

The HIPAA Security Rule: Cloudy Skies Ahead?

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

1B1 SECURITY RESPONSIBILITY

Top 10 Cloud Risks That Will Keep You Awake at Night

Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro

Criminal Justice Information System (CJIS) Vendor Policy Guidelines

Cloud Computing. Mike Bourgeois Platform as a Service Point of View September 17, 2015

With Eversync s cloud data tiering, the customer can tier data protection as follows:

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

The CIO s Guide to HIPAA Compliant Text Messaging

Cloud vs On-Premise Software: And the Winner is

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Cloud Computing. What is Cloud Computing?

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

Solicitation Addendum

Virtualization and Cloud Computing

How to Turn the Promise of the Cloud into an Operational Reality

Introduction to Cloud Computing

NC CJIN Governing Board. 13 October, George A. White

Security Considerations

Media Shuttle s Defense-in- Depth Security Strategy

INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE. Guiding Principles on Cloud Computing in Law Enforcement

The Private Cloud Your Controlled Access Infrastructure

SaaS, PaaS & TaaS. By: Raza Usmani

SaaS Security for the Confirmit CustomerSat Software

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Electronic Records Storage Options and Overview

BMC s Security Strategy for ITSM in the SaaS Environment

What Factors Determine Cloud Computing Adoption by Colleges and Universities? Bill Klug Instructor, BCIT

Security & Trust in the Cloud

Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014

Pharma CloudAdoption. and Qualification Trends

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Compliance and the Cloud: What You Can and What You Can t Outsource

Unified Communications and the Cloud

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.

Legal Issues Associated with Cloud Computing. Laurin H. Mills May 13, 2009

HARNESSING THE POWER OF THE CLOUD

Transcription:

CJIS in the Cloud Oregon State Police CJIS Statewide Training September 23 & 24, 2015 Stephen Exley, CISSP Senior Consultant/Technical Analyst FBI CJIS ISO Program

Cloud Computing

Famous Quotes on Cloud Computing one of the most important transformations the federal government will go through in the next decade Andrew McLaughlin, President Obama s TIGR member, We think everyone on the planet deserves to have their own virtual data center in the cloud... Lew Tucker, CTO of SUN cloud group Cloud computing is really a no brainer for any start up because it allows you to test your business plan very quickly for little money " Brad Jefferson, CEO of Animoto Productions 76

Famous Quotes on Cloud Computing (cont.) The interesting thing about cloud computing is that we ve redefined cloud computing to include everything that we already do. I can t think of anything that isn t cloud computing with all of these announcements Larry Ellison, chairman, Oracle Cloud computing is often far more secure than traditional computing, because companies like Google and Amazon can attract and retain cyber security personnel of a higher quality than many governmental agencies. Vivek Kundra, former federal CIO of the United States 77

Famous Quotes on Cloud Computing (cont.) Discontinued products and services are nothing new, of course, but what is new with the coming of the cloud is the discontinuation of services to which people have entrusted a lot of personal or otherwise important data and in many cases devoted a lot of time to creating and organizing that data. As businesses ratchet up their use of cloud services, they re going to struggle with similar problems, sometimes on a much greater scale. I don t see any way around this it s the price we pay for the convenience of centralized apps and databases but it s worth keeping in mind that in the cloud we re all guinea pigs, and that means we re all dispensable. Caveat cloudster. Nick Carr, author of Does IT Matter?, The Big Switch and The Shallows 78

Famous Quotes on Cloud Computing (cont.) Our industry is going through quite a wave of innovation and it's being powered by a phenomenon which is referred to as the cloud. Steve Ballmer, former CEO of Microsoft I don t need a hard disk in my computer if I can get to the server faster carrying around these non connected computers is byzantine by comparison. Steve Jobs, late chairman of Apple 79

What is Cloud Computing? Defined by the CJIS Security Policy as: A distributed computing model that permits on demand network access to a shared pool of configurable computing resources (i.e., networks, servers, storage, applications, and services), software, and information. 80

Cloud Computing The Cloud Model Explained Cloud Essential Characteristics Broad Measure Service Rapid Elasticity Network Access On Demand Resource Self Service Pooling Cloud Service Models SaaS (Software as a Service) PaaS (Platform as a Service) IaaS (Infrastructure as a Service) Cloud Deployment Models Public Private Hybrid Community 81

Cloud Computing Cloud Essential Characteristics 82

Cloud Computing Cloud Service Models 83

Cloud Computing Cloud Deployment Models 84

Cloud Computing What Does a Cloud Deployment Actually Look Like? 85

Cloud Computing This is a More Realistic Cloud Deployment Diagram On-premise environment 86

Cloud Computing Benefits of Cloud Computing Reduced Budgets Improved Efficiency Disaster Recovery Service Consolidation 87

Cloud Computing Delineation of Responsibility/Governance in Cloud Computing 88

Cloud Computing Security Concerns with Cloud Computing Privileged user access Regulatory compliance Data location Data segregation Recovery Investigative support Long term viability 89

Cloud Computing Is the CJIS Security Policy (CSP) cloud friendly? Yes! The CJIS Security Policy is solution and device agnostic; not prohibitive. Independent assessment recommended stronger controls (assessment results available on FBI.gov) Some LEAs already using cloud services 90

Achieving CSP Compliance Will access to Criminal Justice Information (CJI) within a cloud environment fall within the category of remote access? (5.5.6 Remote Access) Will advanced authentication (AA) be required for access to CJI within a cloud environment? (5.6.2.2 Advanced Authentication, 5.6.2.2.1 Advanced Authentication Policy and Rationale) Does/do any cloud service provider s datacenter(s) used in the transmission or storage of CJI meet all the requirements of a physically secure location? (5.9.1 Physically Secure Location) 91

Achieving CSP Compliance (cont.) Are the encryption requirements being met? (5.10.1.2 Encryption) Who will be providing the encryption as required in the CJIS Security Policy? (client or cloud service provider) Is the data encrypted while at rest and in transit? What are the cloud service provider s incident response procedures? (5.3 Policy Area 3: Incident Response) Will the cloud subscriber be notified of any incident? If CJI is compromised, what are the notification and response procedures 92

Achieving CSP Compliance (cont.) Is the cloud service provider a private contractor/vendor? If so, they are subject to the same screening and agreement requirements as any other private contractors hired to handle CJI (5.1.1.5 Private Contractor User Agreements and CJIS Security Addendum; 5.12.1.2 Personnel Screening for Contractors and Vendors) How will event and content logging be handled? (5.4 Policy Area 4, Auditing and Accountability) Will the cloud service provider handle logging and provide that upon request? Will the cloud service provider allow the CSA and FBI to conduct audits? (5.11.1 Audits by the FBI CJIS Division; 5.11.2 Audits by the CSA) 93

Achieving CSP Compliance (cont.) Cloud Computing and the CJIS Security Policy Section 5.10.1.5 Cloud Computing The metadata derived from CJI shall not be used by any cloud service provider for any purposes. The cloud service provider shall be prohibited from scanning any email or data files for the purpose of building analytics, data mining, advertising, or improving the services provided. Appendix G.3 Cloud Computing White Paper 94

Cloud Computing Use Case #1 Encryption for Data in the Cloud An NCJA decides to start utilizing cloud storage to backup files which do contain CJI. The agency encrypts the files using a product that provides FIPS 140 2 certified encryption of 128 bit. Then, the agency sends the files to a cloud storage solution. The agency maintains the decryption passphrases so no cloud service provider will have access to unencrypted CJI. 95

Cloud Computing Use Case #2 Personnel Security for Cloud Service Provider A local PD is transitioning to a cloud based virtualized network service and will permit the storage and transmission of CJI to/from the cloud. The cloud service provider as part of the service level agreement will provide encryption services for: Data at rest (AES, 256 bit), and An encrypted link for data in transit TLS/SSL (FIPS 140 2 certified, 128 bit) This concept is not much different than outsourcing to a non cloud provider. Any cloud service provider employee that has the capability of accessing the CJI in an unencrypted state (remember: cloud service provider is providing encryption services) must undergo a finger print based background check, security awareness training, and sign the 96 Security Addendum (SA)

Cloud Computing FAQ #1 Question: If our agency wants to store our backup data in a public cloud environment would we be required to have the cloud service provider (a private vendor) employees sign a Security Addendum and be subject to fingerprint based background checks? Answer: Yes. The Security Addendum must be incorporated or referenced in the contract with the cloud service provider, and the Security Addendum Certificate pages must be signed by any and all cloud service provider employees who have access to unencrypted CJI. This ensures the provider agrees to abide by the requirements of the CJIS Security Policy (CSP) including submitting those cloud service provider employees (with access to the unencrypted CJI) for a fingerprint based background check. 97

Cloud Computing FAQ #2 Question: Our city has recently been considering moving to cloud based email service covering all city departments and agencies, to include the local police department. Our question is: Are we allowed to send criminal justice information (CJI) through email? Answer: You can send e mail containing Criminal Justice Information (CJI) as long as it remains within your physically secure environment (as described in the Policy), you send the e mail along an encrypted path (FIPS 140 2 certified, 128 bit) to the recipient, or you encrypt (FIPS 140 2 certified, 128 bit) the payload of an e mail. 98

Questions?

ISO RESOURCES ISO Resources

ISO RESOURCES State CJIS Representatives State CJIS CSO/ISO should be the first stop for any questions or concerns Responsible for CJIS systems in their state/agency State CJIS requirements may differ from the CSP CSO/ISO should be kept in the loop with the CJIS issues in their state/agency Forwards requests for changes to the CJIS Security Policy to the CJIS ISO Program

ISO RESOURCES CJIS ISO Program Steward the CJIS Security Policy for the Advisory Policy Board Draft and present topic papers at the APB meetings Provide Policy support to state ISOs and CSOs Policy Clarification Solution technical analysis for compliance with the Policy Operate a public facing web site on FBI.gov: CJIS Security Policy Resource Center Provide training support to ISOs Provide policy clarification to vendors in coordination with ISOs

ISO RESOURCES The CJIS Security Policy!!!

ISO RESOURCES CSP Requirements Document Companion document to the CSP Lists every requirement, shall statement, and corresponding location and effective date Updated annually in conjunction with the CSP

ISO RESOURCES CSP Resource Center Publically Available http://www.fbi.gov/about us/cjis/cjis security policy resourcecenter/view Features: Search and download the CSP Download the CSP Requirements Document 2014 ISO Symposium Presentations Use Cases (Advanced Authentication and others to follow) Cloud Computing Report & Cloud Report Control Catalog Mobile Appendix Submit a Question (question forwarded to CJIS ISO Program) Links of Importance

ISO RESOURCES CSP Resource Center http://www.fbi.gov/about us/cjis/cjis security policy resource center/view Step #1 Select About Us Step #2 Select Criminal Justice Information Services

ISO RESOURCES CSP Resource Center http://www.fbi.gov/about us/cjis/cjis security policy resource center/view Step #3 Select Security Policy Resource Center

ISO RESOURCES CSP Resource Center http://www.fbi.gov/about us/cjis/cjis security policy resource center/view iso@leo.gov

ISO RESOURCES CSP Resource Center http://www.fbi.gov/about us/cjis/cjis security policy resource center/view iso@leo.gov

CJIS ISO CONTACT INFORMATION George White, CJIS ISO (304) 625 5849 george.white@ic.fbi.gov Chris Weatherly, CJIS ISO Program Manager (304) 625 3660 john.weatherly@ic.fbi.gov Jeff Campbell, CJIS Assistant ISO (304) 625 4961 jeffrey.campbell@ic.fbi.gov Steve Exley, Senior Consultant/Technical Analyst (304) 625 2670 stephen.exley@ic.fbi.gov iso@ic.fbi.gov

QUESTIONS? Stephen Exley, CISSP Senior Consultant/Technical Analyst FBI CJIS ISO Program (304) 625 2670 stephen.exley@ic.fbi.gov iso@ic.fbi.gov