Security and Compliance in Clouds



Similar documents
Security und Compliance in Clouds

Security and Compliance in Clouds: Challenges and Solutions

A Pattern-Based Method for Identifying and Analyzing Laws

Security and Compliance in Clouds

A Pattern-based Method for Establishing a Cloud-specific Information Security Management System

Compliance in Clouds A cloud computing security perspective

SUPPORTING THE SECURITY CERTIFICATION OF CLOUD-COMPUTING-INFRASTRUCTURES

Course 20465C: Designing a Data Solution with Microsoft SQL Server

This course is intended for database professionals who need who plan, implement, and manage database solutions. Primary responsibilities include:

Designing a Data Solution with Microsoft SQL Server 2014

DATA RECOVERY SOLUTIONS EXPERT DATA RECOVERY SOLUTIONS FOR ALL DATA LOSS SCENARIOS.

Designing a Data Solution with Microsoft SQL Server 2014

Designing a Data Solution with Microsoft SQL Server

Guideline 1. Cloud Computing Decision Making. Public Record Office Victoria Cloud Computing Policy. Version Number: 1.0. Issue Date: 26/06/2013

Course 20465: Designing a Data Solution with Microsoft SQL Server

Designing a Data Solution with Microsoft SQL Server

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

20465: Designing a Data Solution with Microsoft SQL Server

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

20465C: Designing a Data Solution with Microsoft SQL Server

Security Architecture Principles A Brief Introduction. Mark Battersby , Oslo

Cloud Security checklist Are you really ready for Cloud

"Charting the Course... MOC C Designing a Data Solution with Microsoft SQL Server Course Summary

Course 20465C: Designing a Data Solution with Microsoft SQL Server

Designing a Data Solution with Microsoft SQL Server

Cloud Security. DLT Solutions LLC June #DLTCloud

Designing a Data Solution with Microsoft SQL Server 2014

Outline. MCSE: Data Platform. Course Content. Course 10776C: MCSA: Developing Microsoft SQL Server 2012 Databases 5 Days

WHAT DOES IT SERVICE MANAGEMENT LOOK LIKE IN THE CLOUD? An ITIL based approach

A Holistic Framework for Enterprise Data Management DAMA NCR

Validating Enterprise Systems: A Practical Guide

Microsoft s Compliance Framework for Online Services

RE tools survey (part 1, collaboration and global software development in RE tools)

SUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR

Automatic Topology Completion of TOSCA-based Cloud Applications

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

Profile. Jens Staab. Diplom Informatiker (FH) Age-group: 1967 City: Frankfurt am Main. Technical focus

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

20465D: Designing Solutions for Microsoft SQL Server 2014

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

NIST Big Data Phase I Public Working Group

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Information Security Management Systems

Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions

Cloud computing in the Enterprise: An Overview

Compliance and the Cloud: What You Can and What You Can t Outsource

Best Practices in Disaster Recovery Planning and Testing

Certified Information Professional 2016 Update Outline

ISO27001 Controls and Objectives

Governance and Management of Information Security

Information governance: What is it? How is it implemented?

MS 20465C: Designing a Data Solution with Microsoft SQL Server

Cyber Security and Cloud Computing. Dr Daniel Prince Course Director MSc in Cyber Security

Cloud Computing Security Audit

Checklist of ISO Mandatory Documentation

Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken )

A Variability Viewpoint for Enterprise Software Systems

Moving from BS to ISO The new international standard for business continuity management systems. Transition Guide

Effective Contract Management

Master Data Management Architecture

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

Achieving Security through Compliance

Cisco Unified Data Center: The Foundation for Private Cloud Infrastructure

INTRODUCTION TO ISO 9001 REVISION - COMMITTEE DRAFT

Core Fittings C-Core and CD-Core Fittings

Industrial case study: Zero defect secure software for the National Security Agency

Cloud Security Introduction and Overview

Cloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com

Information Security Management System for Cloud Computing

INFORMATION TECHNOLOGY FLASH REPORT

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects

Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts

Secure Cloud Computing through IT Auditing

Accounting for Non-Functional Requirements in Productivity Measurement, Benchmarking & Estimating

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP HP ENTERPRISE SECURITY SERVICES

CLOUD COMPUTING An Overview

AUD105-2nd Edition. Auditor s Guide to IT - 20 hours. Objectives

Security Controls What Works. Southside Virginia Community College: Security Awareness

6 Cloud computing overview

QAD CLOUD ERP QAD CLOUD ERP IS BUILT FOR MANUFACTURERS, BUILT FOR YOU

Modelling, Analysing and Improving an ERP Architecture with ArchiMate

Transcription:

Security and Compliance in Clouds Pattern-Based Compliance and Security Requirements Engineering Martin Hirsch, Jan Jürjens, Jan-Christoph Küster Fraunhofer Institut für Software- und Systemtechnologie ISST, Dortmund iqnite 2011, Düsseldorf 24. May 2011 Contact: jan-christoph.kuester@isst.fraunhofer.de

Architectures for Auditable Business Process Execution (APEX) Tool supported methods for security and compliance checks on business processes Modeling time: Syntax checks of models Runtime: Conformance checks with log data Analysis based on different types of models BPMN2.0, UMLsec or system log data Attract-Program at Fraunhofer ISST Focus on insurance domain 2

Agenda NIST Cloud Definition Framework Cloud Security and Compliance Goals Challenges and Conflicts Pattern-Based Compliance and Security Engineering Cloud System Analysis Pattern Example: Cloud Online Banking Scenario Supporting the Information Security Standard ISO 2700x Vision and Future Work 3

The NIST Cloud Definition Framework P. Mell and T. Grance, The NIST definition of cloud computing, Working Paper of the National Institute of Standards and Technology (NIST), 2009 4

Cloud Security Goals 5

Regulatory compliance Compliance management is a broad term covering all activities and methods to ensure that a company follows all policies required by an external or internal regulation E. K. Marwane and S. Stein, Policy-based semantic compliance checking for business process management, 2008. BDSG ISO2700x HGB MARisk BSI-Grundschutzkatalog AktG KWG AO Even for a small outsourcing task, a huge number of laws might become relevant 6

Regulatory compliance Compliance management is a broad term covering all activities and methods to ensure that a company follows all policies required by an external or internal regulation E. K. Marwane and S. Stein, Policy-based semantic compliance checking for business process management, 2008. BDSG 91, 93 AktG Responsibility of management to implement ISO2700x HGB early warning risk management Not mentioned explicitely, but also for IT MARisk BSI-Grundschutzhandbuch AktG KWG AO Even for a small outsourcing task, a huge number of laws might become relevant 7

Regulatory compliance Compliance management is a broad term covering all activities and methods to ensure that a company follows all policies required by an external or internal regulation E. K. Marwane and S. Stein, Policy-based semantic compliance checking for business process management, 2008. BDSG ISO2700x HGB MARisk 25a KWG AktG BSI-Grundschutzhandbuch disaster recovery plan of the IT systems KWG AO Even for a small outsourcing task, a huge number of laws might become relevant 8

Regulatory compliance Compliance management is a broad term covering all activities and methods to ensure that a company follows all policies required by an external or internal regulation E. K. Marwane and S. Stein, Policy-based semantic compliance checking for business process management, 2008. BDSG MARisk 147 AO Archiving of documents Rules AktG BSI-Grundschutzhandbuch are still relevant, even if filing of documents is done in an electronic way KWG ISO2700x AO HGB Even for a small outsourcing task, a huge number of laws might become relevant 9

Regulatory compliance Compliance management is a broad term covering all activities and methods to ensure that a company follows all policies required by an external or internal regulation E. K. Marwane and S. Stein, Policy-based semantic compliance checking for business process management, 2008. BDSG ISO2700x HGB MARisk Forbid sharing of data with companies AktG or BSI-Grundschutzhandbuch governments in countries with weaker laws US Patriot Act vs. Safe Harbour KWG AO Even for a small outsourcing task, a huge number of laws might become relevant 10

Motivation Cloud Computing is a specific case of outsourcing: Short term outsourcing decisions are possible Multiple customers on one outsourcing platform The scope of IT outsourcing increases Security and Compliance: Identifying relevant security requirements, laws and regulations for an international cloud scenario is a challenge: Complex environment with many stakeholders Location independence Patterns: Pattern-based approaches ease and provide a structured way of elicitation of security or compliance requirements Offer re-usability and tool-support 11

Cloud System Analysis Pattern 12 Beckers, Faßbender, Küster, Schmidt, A Pattern-Based Method for Identifying and Analysing Laws in the Field of Cloud Computing Compliance, ARES 2011, to appear.

Example: Cloud Online Banking Scenario A German bank plans to offer online banking services, that includes: Offering service access to customers in Germany via web interface Integrate significant scalability in terms of customers using the online banking services Customer data, e.g., account information, amount and transaction histories are stored in the cloud Task a subsidiary with the required software development Outsource the affected IT processes to a cloud provider in the USA 13

Instantiated Cloud System Analysis Pattern 14

Direct Stakeholder Template Instance 15

ISO 27005 - Information Security Risk Management 16 ISO/IEC, Information technology - security techniques - information security risk management, ISO/IEC 27005, 2008

Context Establishment and Asset Identification in ISO 27005 Context Establishment (ISO 27005, Clause 7) Input General Considerations Context Establishment Output Scope and Boundaries Basic Criteria Asset Identification (ISO 27005, Clause 8.2.1.2) Input General Considerations Asset Identification Output Assets to be Risk Managed Business Process related to asset 17

Instantiated Cloud System Analysis Pattern Context Establishment 18

Pattern-based Support for Context Establishment and Asset Identification in ISO 27005 Asset Identification Asset owner Types of information: Vital Personal Strategic High-cost 19

Conclusion and Future Work Conclusion: Conflicts of Cloud Security Goals Identifying of Security and Compliance Requirements challenging Pattern-based analysis of cloud scenarios Support of ISO 2700x standard Future Work: Requirements engineering method for cloud security and compliance Tool-Support, e.g., recommender-system 20