Security in the Cloud



Similar documents
Security in the Cloud: Visibility & Control of your Cloud Service Providers

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Cloud Security and Managing Use Risks

LEGAL ISSUES IN CLOUD COMPUTING

Orchestrating the New Paradigm Cloud Assurance

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Cloud Computing in a Regulated Environment

Cloud Security. DLT Solutions LLC June #DLTCloud

Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors

Managing Cloud Computing Risk

Key Considerations of Regulatory Compliance in the Public Cloud

CPNI VIEWPOINT 01/2010 CLOUD COMPUTING

How to ensure control and security when moving to SaaS/cloud applications

On Premise Vs Cloud: Selection Approach & Implementation Strategies

Big Data, Big Risk, Big Rewards. Hussein Syed

Fact Sheet Yellowfin & Cloud Computing

Information Technology: This Year s Hot Issue - Cloud Computing

Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015

Dispelling the Myths about Cloud Computing Security

Protec'ng Data and Privacy in a World of Clouds and Third Par'es Vincent Campitelli

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

Cloud Computing and Records Management

Cloud Security Introduction and Overview

Service Measurement Index Framework Version 2.1

Cloud Security Who do you trust?

Guideline on Implementing Cloud Identity and Access Management

Security & Trust in the Cloud

Security and Privacy in Cloud Computing

The problem of cloud data governance

Release 1. ICAICT814A Develop cloud computing strategies for a business

Secure Enterprise Mobility Management. Cloud-Based Enterprise Mobility Management. White Paper: soti.net

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

Secure Your Cloud and Outsourced Business with Privileged Identity Management

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Cisco Cloud Assessments. Justin Tang

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Data Risk Management: ISM Ground to Cloud Summit. accelerate your ambition 1

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

IIA Conference. September 18, Paige Needling Director, Global Information Security Recall, Inc.

Legal Issues Associated with Cloud Computing. Laurin H. Mills May 13, 2009

Software Service Agreement. <Client Name>

Public Cloud Workshop Offerings

John Essner, CISO Office of Information Technology State of New Jersey

Data Privacy and Security for Market Research in the Cloud

Consumption IT. Michael Shepherd Business Development Manager. Cisco Public Sector May 1 st 2014

Open Certification Framework. Vision Statement

Cloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs

Cloud Computing in a Government Context

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

Cloud Security Alliance New Zealand Contribution to the Privacy Commissioner. 23 February 2012

Security Considerations for the Cloud

Cloud Security Benchmark: Top 10 Cloud Service Providers Appendix A E January 5, 2015

Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World

A Comparison of IT Governance & Control Frameworks in Cloud Computing. Jack D. Becker ITDS Department, UNT & Elana Bailey

Services Providers. Ivan Soto

Assessing Risks in the Cloud

Securing the Cloud. Cloud Computer Security Techniques and Tactics. Vic (J.R.) Winkler. Technical Editor Bill Meine ELSEVIER

Cloud Security Who do you trust?

The Value of Vulnerability Management*

Cloud Computing; What is it, How long has it been here, and Where is it going?

WP9 D9.5 Risk Analysis and Countermeasures

IDENTITY & ACCESS MANAGEMENT IN THE CLOUD

Cloud Services Overview

What Cloud computing means in real life

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

Successful Strategies for Implementing SaaS/Cloud Solutions in Healthcare

GRC Stack Research Sponsorship

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

treasury risk management

Public Cloud Service Agreements: What to Expect & What to Negotiate. April 2013

Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications

Cloud Computing Contracts. October 11, 2012

Transcription:

Security in the Cloud Visibility & Control of your Cloud Service Provider Murray Goldschmidt, Pierre Tagle, Ph.D. April 2012 Compliance, Protection & Business Confidence Sense of Security Pty Ltd Sydney Level 8, 66 King Street Sydney NSW 2000 Australia Melbourne Level 10, 401 Docklands Drv Docklands VIC 3008 Australia T: 1300 922 923 T: +61 (0) 2 9290 4444 F: +61 (0) 2 9290 4455 info@senseofsecurity.com.au www.senseofsecurity.com.au ABN: 14 098 237 908 www.senseofsecurity.com.au Sense of Security 2012 Page 1 April 2012

Outline Cloud Service Providers and Security Developing a Strategic Cloud Security Roadmap Questions to Ask a CSP - make an informed decision www.senseofsecurity.com.au Sense of Security 2012 Page 2 April 2012

Introduction Looking to the cloud Gartner says that in 2012, 80% of Fortune 1000 enterprises will pay for cloud services Another 30% will pay for cloud infrastructure Cloud summary Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) Cloud Service Provider (CSP) www.senseofsecurity.com.au Sense of Security 2012 Page 3 April 2012

Customers and the Cloud Cloud service providers (CSP) do not think security is a reason for customers to use their services. The top choices are reduced cost, faster deployment time, improved customer service, and increased efficiency. Source: Security of Cloud Computing Providers Study, Ponemon Institute (April 2011) www.senseofsecurity.com.au Sense of Security 2012 Page 4 April 2012

Cloud Security Risks Areas cloud providers are most confident: ability to ensure recovery from significant IT failures ensure physical location of data assets are in secure environment Source: Security of Cloud Computing Providers Study, Ponemon Institute (April 2011) Areas cloud providers are least confident: ability to restrict privileged user access to sensitive data ensure proper data segregation requirements are met www.senseofsecurity.com.au Sense of Security 2012 Page 5 April 2012

Other CSP Findings Majority of CSPs believe it is the customer s responsibility to secure the cloud. Majority say their systems and applications are not always evaluated for security threats prior to deployment to customers. Majority of CSPs in the study admit they do not have dedicated security personnel Different priorities between users and CSPs with regards to critical security areas Who is most responsible for ensuring the security of cloud resources by cloud providers? Critical areas of security for cloud providers Source: Security of Cloud Computing Providers Study, Ponemon Institute (April 2011) www.senseofsecurity.com.au Sense of Security 2012 Page 6 April 2012

Cloud Service Models Differences in scope and control among cloud service models (cloud provider vs. consumer) Source: Cloud Security Alliance (CSA) www.senseofsecurity.com.au Sense of Security 2012 Page 7 April 2012

Service Agreements Service agreements Terms & conditions of access Use of services Service period, exit conditions Pre-defined non-negotiable agreements vs. negotiated agreements Pre-defined: prescribed by CSP, not written to align with regulations, unilateral changes, basis for economies of scale Negotiated: can be used to address specific concerns, normally more costly www.senseofsecurity.com.au Sense of Security 2012 Page 8 April 2012

Cloud Security Roadmap Developing a strategic cloud security roadmap Define business & IT strategy Define GRC strategy Identify the risks Choose / select providers Document the plan www.senseofsecurity.com.au Sense of Security 2012 Page 9 April 2012

Define Business & IT Strategy Business-centric security Understand the business requirements Define appropriate policies Data sensitivity Low, medium & high sensitivity Cross border questions Risk appetite Will direct the scope & depth of cloud services Business agreement on acceptable risk www.senseofsecurity.com.au Sense of Security 2012 Page 10 April 2012

Define GRC Strategy Survivability and Legal Matters Enhanced Policies and Formal Processes Enhanced Training and Awareness Audit and Due Diligence www.senseofsecurity.com.au Sense of Security 2012 Page 11 April 2012

Survivability & Legal Strategy Traditional strategies may not apply Move to the cloud requires new approaches Transfer of risk to cloud provider? Legal analysis of the liabilities? Implications on information ownership & usage rights? Discussions on containment, segregation, monitoring & response, and a strong right to audit is needed www.senseofsecurity.com.au Sense of Security 2012 Page 12 April 2012

Enhanced Policies Policy framework need to go beyond traditional approaches Policies need to map each policy requirement with specific control requirements, and tied to business and/or regulatory requirements These enhanced policies provide clearer guidance in defining and managing the organisation s cloud security approaches Governance Government Corporate ISMF www.senseofsecurity.com.au Sense of Security 2012 Page 13 April 2012 PCI Sections and Requirement Sections and Requirement Sections and Requirement Visibility Policy Policy Policy Control Compliance Saas Paas Iaas

Enhanced Policies Governance Government Sections and Requirement Policy Compliance Saas Corporate ISMF Sections and Requirement Policy Paas PCI Sections and Requirement Policy Iaas Visibility Control Source: Adapted from Cloud Security Alliance (CSA) www.senseofsecurity.com.au Sense of Security 2012 Page 14 April 2012

Formal Processes Adhoc processes will not do Decision methodology and risk management processes need to be clearly defined and understood Security practices need to be documented taking into consideration that direct infrastructure management may not be possible Visibility of the environment must be maintained with key metrics identified and tracked www.senseofsecurity.com.au Sense of Security 2012 Page 15 April 2012

Enhanced Training & Awareness Are current training programs appropriate? Define training objectives: Connect people to the rationale and importance of enhanced policies and controls Identify tie-in with daily responsibilities Identify desired outcomes Identify need Evaluate Deliver training that improves decision making that have impact on security www.senseofsecurity.com.au Sense of Security 2012 Page 16 April 2012

Audit & Due Diligence Ask the right questions! Tie audit & quality management to specific requirements, assets & objectives Define items specifically to allow for improved visibility into practices How does the audit program allow your organisation to more effectively manage risk? www.senseofsecurity.com.au Sense of Security 2012 Page 17 April 2012

Ask the Right Questions What are the implications on information ownership & usage rights? Consider data location issues. What types of technical & non-technical controls are available to ensure data integrity & availability? What mechanisms are in place to ensure appropriate segregation? www.senseofsecurity.com.au Sense of Security 2012 Page 18 April 2012

Ask the Right Questions What are the exit procedures & related costs? Consider data retention risks. How are security responsibilities defined? What monitoring & reporting mechanisms are available? www.senseofsecurity.com.au Sense of Security 2012 Page 19 April 2012

Ask the Right Questions Is there a right to audit? Or adequate audit coverage by 3 rd party? What are the obligations between parties if things go wrong? Is there a formal plan to handle data security breaches? www.senseofsecurity.com.au Sense of Security 2012 Page 20 April 2012

Risk Assessment Identify risks Legislative or regulatory Avoid Compliance obligations Multi-tenancy Data security Data ownership Business continuity Contractual agreements Vendor lock-in Data lock-in? ACCEPT Risk REDUCE TRANSFER www.senseofsecurity.com.au Sense of Security 2012 Page 21 April 2012

Vendor Selection Due diligence Data location Available controls Certification Vulnerability management Develop your checklist Use available guides and resources wherever applicable NIST 800-144, 145, 146 CSA Cloud Controls Matrix, Consesus Assessments Initiative, Security Guidance v3 www.senseofsecurity.com.au Sense of Security 2012 Page 22 April 2012

Document the Plan Analysis of key business/it transformations Development of the solution Conduct QA and testing Implementation steps Back-out measures Get business agreement on the plan and associated risks www.senseofsecurity.com.au Sense of Security 2012 Page 23 April 2012

Moving Forward Understand the cloud, get expert advice if needed Analyse business requirements & IT capabilities Define a robust GRC program that considers cloud risks and concerns Know your data/know how to secure it Identify the risks & legal obligations Ask the right questions Select appropriate CSP Verify exit requirements www.senseofsecurity.com.au Sense of Security 2012 Page 24 April 2012

Thank you Review our whitepapers at www.senseofsecurity.com.au/research/it-security-articles Recognised as Australia s fastest growing information security and risk management consulting firm through the Deloitte Technology Fast 50 & BRW Fast 100 programs Head office is level 8, 66 King Street, Sydney, NSW 2000, Australia. Owner of trademark and all copyright is Sense of Security Pty Ltd. Neither text or images can be reproduced without written permission. T: 1300 922 923 T: +61 (0) 2 9290 4444 F: +61 (0) 2 9290 4455 info@senseofsecurity.com.au www.senseofsecurity.com.au www.senseofsecurity.com.au Sense of Security 2012 Page 25 April 2012