Dr. Jesus Luna Garcia



Similar documents
Making SLA s Useful for Security

Leveraging the Potential of Cloud Security Service Level Agreements through Standards

European Cloud. Computing Strategy. State of play: Ken Ducatel DG CONNECT

Preliminary Design of a Platform-as-a-Service to Provide Security in Cloud

Federal Aviation Administration. efast. Cloud Computing Services. 25 October Federal Aviation Administration

Helix Nebula: Secure Brokering of Cloud Resources for escience. Dr. Jesus Luna Garcia

Accelerating Cloud adoption with Security Level Agreements automation, monitoring and industry standards compliance

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

Cloud and Critical Information Infrastructures

Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service

Cloud Standards Coordination Final Report November 2013 VERSION 1.0

The problem of cloud data governance

European Cloud Computing. Strategy. Cloud standards. Ken Ducatel DG CONNECT

ENISA and Cloud Security

The Next Generation Data Centers: SPECS and The 3 rd Platform.

A Model for Accomplishing and Managing Dynamic Cloud Federations

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

Cloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

Standardised SLAs: how far can we go? DIHC, Euro-Par 2013, Aachan John Kennedy Intel Labs Europe

A CLOUD ADOPTION RISK ASSESSMENT MODEL

Self-protecting multi-cloud applications

CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs

TECHNICAL SPECIFICATION: ABBREVIATIONS AND GLOSSARY

Accountability in Cloud Computing An Introduction to the Issues, Approaches, and Tools

Public Cloud Workshop Offerings

Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division. U.S. Department of Agriculture

Cloud computing and personal data protection. Gwendal LE GRAND Director of technology and innovation CNIL

Cloud Computing Standards: Overview and ITU-T positioning

Cloud Computing in a GxP Environment: The Promise, the Reality and the Path to Clarity

THE BUSINESS OF CLOUD

Agenda. What is Service Level Agreement (SLA)? Why using ONE tool for SLA management? What s New on the Market? Oblicore Guarantee.

What REALLY matters in Cloud Security? RE: Internet of things sensors, data, security and beyond!

Alliance Scorecarding and Performance Management at TechCo. A Vantage Partners Case Study

IMPLEMENTING SERVICE LEVEL MANAGEMENT

Incident Management. Verdis Spearman

Federation of Cloud Computing Infrastructure

BRIDGE. the gaps between IT, cloud service providers, and the business. IT service management for the cloud. Business white paper

The Cloud Computing Revolution: Beyond the Hype

ITSM 101. Patrick Connelly and Sandeep Narang. Gartner.

Service Performance Aspects for Cloud Service Level Agreements

September 17, 1:00 PM. Dean Sorensen, Founder, IBP Collaborative

Prof. Udo Helmbrecht

On the Adoption of Security SLAs in the Cloud

Cloud Service Broker Portal: Main entry point for multi-cloud service providers and consumers

Audit of the CFPB s Acquisition and Contract Management of Select Cloud Computing Services

Blend Approach of IT Service Management and PMBOK for Application Support Project

CRISIS MANAGEMENT AND FIRST AID: WHEN GOVERNMENT CONTRACTORS ARE THE HEADLINERS WELCOME

BMC Software Consulting Services. Fermilab Computing Division Service Catalog & Communications: Process and Procedures

FLEXIANT. Utility Computing on Demand

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

CForum: A Community Driven Solution to Cybersecurity Challenges

D4.1 Cloud certification guidelines and recommendations

A Framework to Improve Communication and Reliability Between Cloud Consumer and Provider in the Cloud

ITIL Foundation for IT Service Management 2011 Edition

European Cloud Computing Strategy

Highlights & Next Steps

Module 1: Supply Chain Design

Role of contracts in Cloud Computing an Overview. Kevin McGillivray Doctoral Candidate (NRCCL)

The Cloud Security Alliance

Aternity Virtual Desktop Monitoring. Complete Visibility Ensures Successful VDI Outcomes

A Comparison of IT Governance & Control Frameworks in Cloud Computing. Jack D. Becker ITDS Department, UNT & Elana Bailey

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

ENISA and Cloud Security

COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'

SLA Model Terms and Specifications: SLALOM Project Overview and Request for Feedback

Cloud Federations in Contrail

Shared Services Canada (SSC)

Transcription:

Cloud Accountability and SLAs: research challenges and opportunities Dr. Jesus Luna Garcia jluna@cloudsecurityalliance.org

Outline Cloud SLA s one year ago Open Research Challenges: Standardization/certification Accountability SLA management Final remarks

One year ago: CCSW 12 Specifying security parameters in Cloud Service Level Agreements (SLA). A promising approach for cloud security assurance. SLA s in action: ENISA EU FP7 projects Cloud Security Alliance How to quantitatively reason about Cloud SLA s? CSPs specifying security in SLAs (source: ENISA)

CHALLENGES

European Cloud Initiative The specific objectives of the SIG SLA are to create: Baseline and recommendations for SLA specifications, languages & modelling. Baseline and recommendations for SLA Management. Baseline and recommendations for SLA enforcement supporting mechanisms. European Cloud Initiative

ETSI CSC: cloud standardization gaps Focus on SLA, SEC and IOP. Preliminaries Use cases (UCs) elicitation. Create list with relevant cloud standards/specifications/others. UCs activities Choose representative UCs. For each UC, create activities from 3 perspectives: acquisition, operation, termination. Where applicable, identify generic activities (i.e., apply to all UCs). Gap analysis Map listed standards/specifications to UCs activities (either generic or specific). Add related work (i.e., documents identified as other ). If no applicable standard/specification exists, this activity becomes a gap.

ETSI CSC: lessons learned No jungle of standards, but jungle of forums: Standards and specifications vs. related works (including scientific papers). Gap analysis: Lack of standards vs. lack of cloud standards. Do identified standards really fill the gap?

ETSI CSC: lessons learned Gap on SLA models that support common metrics and vocabularies. (Semi-)Automated SLA management: Reality or fiction? Public review of CSC report started Nov-7 th.

Standardization and certification EU project CIRRUS: Brings together different stakeholders views, including research community. Surveys emerging and future challenges for building the chain of trust. Identified Cloud SLA challenges: SLA s Monitoring-as-a-Service. Cloud federations and cloud brokers, open new SLA-related challenges e.g., composition, is it time for an SLA algebra? Security assurance!

Cloud accountability Accountability-based approaches for trust and assurance EU FP7 A4Cloud.

Conceptual accountability framework Can SLA s be used to manage accountability in the cloud?

SLA management Create, promote and exploit an open source PaaS to offer and manage security features through SLAs.

SPECS PaaS model 1 Use Case: Added-value cloud broker End-user negotiates security with broker Integrates required/new cloud security services into CSP Continuous SLA monitoring to offer best available CSP

SPECS PaaS model 2 Use Case: CSP-managed Flexible SLAs offered to the end user Security is adapted to end user requirements SLA constantly monitored to react against e.g., cyber incidents

SPECS PaaS model 3 Use Case: User-managed (possibly a community cloud) User s services benefit from PaaS security services User dashboard to monitor achieved security levels

Open Challenges SLA (security) Negotiation: Security Aggregation = QoSec (cf., CCSW 12 paper) Quantitative vs. Qualitative vs. Probabilistic security metrics User-centric, trade-offs evaluation Continuous SLA Monitoring: Once again, security assurance. Don t reinvent the wheel e.g., extend Cloud Trust Protocol Critical factors: performance, intrusiveness,

Open Challenges Automated SLA enforcement: Guarantee a negotiated SLA/sustained QoSec SLA-based incident management. Real-world validation!

Final remarks Standardization (SLAs, vocabularies, metrics). Composition in the cloud of public services: Cloud brokers everywhere (Secure) SLA composition

Final remarks Bridging the (cloud security) gap between academic and industrial research Hopefully you ll leave with new ideas for CCSW 14