Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University



Similar documents
Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Seeing Though the Clouds

Cloud Security Introduction and Overview

Cloud Computing; What is it, How long has it been here, and Where is it going?

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB

Cloud Courses Description

Security Issues in Cloud Computing

What Cloud computing means in real life

OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Cloud Courses Description

Cloud Computing Guide & Handbook. SAI USA Madhav Panwar

Managing Cloud Computing Risk

CLOUD COMPUTING OVERVIEW

Cloud Computing Governance & Security. Security Risks in the Cloud

Private Cloud Database Consolidation with Exadata. Nitin Vengurlekar Technical Director/Cloud Evangelist

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

CHAPTER 8 CLOUD COMPUTING

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) Introduction to Cloud Security. Taniya

LESSON 13 VIRTUALIZATION AND CLOUD COMPUTING

John Essner, CISO Office of Information Technology State of New Jersey

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

PRIVATE CLOUD PLATFORM OPTIONS. Stephen Lee CEO, ArkiTechs Inc.

IT Audit in the Cloud

Cloud Risk Management: How to Consolidate your CSP and Corporate Risk Profile

21/09/11. Introduction to Cloud Computing. First: do not be scared! Request for contributors. ToDO list. Revision history

Securing the Physical, Virtual, Cloud Continuum

Cloud Computing. What is Cloud Computing?

SECURE CLOUD COMPUTING

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Cloud Security & Risk. Adam Cravedi, CISA Senior IT Auditor acravedi@compassitc.com

Cloud Services Overview

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Cloud Security Alliance New Zealand Contribution to the Privacy Commissioner. 23 February 2012

Security Issues in Cloud Computing

SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING

Security Model for VM in Cloud

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit

Cloud Computing Standards: Overview and ITU-T positioning

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

A Secure System Development Framework for SaaS Applications in Cloud Computing

Cloud Computing--Efficiency and Security

6 Cloud computing overview

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

Secure Cloud Computing through IT Auditing

Cloud Computing Overview

Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Federal Aviation Administration. efast. Cloud Computing Services. 25 October Federal Aviation Administration

Cloud Computing Architecture: A Survey

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Data Privacy, Security, and Risk Management in the Cloud

Security & Trust in the Cloud

CLOUD COMPUTING DEMYSTIFIED

Validating Cloud. June 2012 Merry Danley

Deploying Public, Private, and Hybrid Storage Clouds. Marty Stogsdill, Oracle

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

Cloud Computing: Risks and Auditing

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

CLOUD COMPUTING. When It's smarter to rent than to buy

Cloud Security Prof. Dr. Michael Waidner Fraunhofer SIT CASED. Fraunhofer SIT. Fraunhofer-Gesellschaft 2011

Data Security In The Cloud

Top 10 Cloud Risks That Will Keep You Awake at Night

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Cloud Computing. Chapter 1 Introducing Cloud Computing

Lecture 02a Cloud Computing I

Clinical Trials in the Cloud: A New Paradigm?

A Gentle Introduction to Cloud Computing


SECURITY & DATA PROTECTION ON THE CLOUD. Evènement parallèle organisé par l ANSI 16 novembre 2015 Hammamet, Tunisie

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

Cloud Models and Platforms

Cloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com

Assessing Risks in the Cloud

Cloud Computing An Auditor s Perspective

Architectural Implications of Cloud Computing

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

How To Get A Cloud Security System To Work For You

Transcription:

Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

What is cloud computing? What are some of the keywords? How many of you cannot think of anything? 10/28/2015 jryoo@psu.edu 2

Essential Characteristics Rapid provisioning Minimal o Management effort o Service provider interaction Scalability but o Multi-tenancy 10/28/2015 jryoo@psu.edu 3

Essential Characteristics II On-demand self-service Rapid elasticity Broad network access Measured service o Metering Resource pooling 10/28/2015 jryoo@psu.edu 4

What is cloud computing? A Model for enabling o Ubiquitous o Convenient o On-demand network access to A shared pool of configurable computing resources Source: SP 800-145 by National Institute of Standards and Technology (NIST), 2011 10/28/2015 jryoo@psu.edu 5

Types of Clouds According to Uses Software as a Service o SaaS Platform as a Service o PaaS Infrastructure as a Service o IaaS 10/28/2015 jryoo@psu.edu 6

Types of Clouds Public cloud Private cloud Community cloud 10/28/2015 jryoo@psu.edu 7

The Bad News Many of the characteristics that make cloud computing great also o Make it less secure o Present extra security challenges 10/28/2015 jryoo@psu.edu 8

The Bad News II Problems o Countermeasures Traditional security controls are ineffective o Evaluation of the security of cloud services Conventional security auditing approaches are insufficient 10/28/2015 jryoo@psu.edu 9

Goals Security challenges specific to cloud computing What is available for cloud security o Standards o Technologies Guidance for Cloud Service Users (CSUs) o What to look out for 10/28/2015 jryoo@psu.edu 10

Cloud Security Challenges 10/28/2015 jryoo@psu.edu 11

Root Causes Scale o The sheer number of VMs Scope o New types of technologies Security of hypervisors o Intangible and logical Virtual switches Virtual routers 10/28/2015 jryoo@psu.edu 12

Root Causes Complexity more time and resources to properly manage security o Scale + scope o Third-party involvement o Colocation via multi-tenancy o Cross-border concerns the importance of physical location of data Compliance requirements for varying laws and regulations 10/28/2015 jryoo@psu.edu 13

Financial Industry-Specific Causes More end user traffic o Online banking Diversity of devices o PC, mobile, tablet, etc. Various network types o Public Wi-Fi, 4G, etc. 10/28/2015 jryoo@psu.edu 14

More Stringent Requirements Availability o 24/7 Accessibility o End user-driven access control Confidentiality o Encryption 10/28/2015 jryoo@psu.edu 15

Bottom Line Knowing what to look for is critical! o In addition to the traditional IT security checklist 10/28/2015 jryoo@psu.edu 16

Transparency Quality of Service (QoS) information o Availability? Incidents Certifications Policies Controls 10/28/2015 jryoo@psu.edu 17

Transparency II Subcontractors Location of data Privacy o Government surveillance Legal and liability issues o For example, service outages 10/28/2015 jryoo@psu.edu 18

Transparency III Does the contract or Service-Level Agreement (SLA) include a transparency clause? Proper propagation of risk knowledge is the key! 10/28/2015 jryoo@psu.edu 19

Encryption Who encrypts the data? o CSU o CSP By default (e.g., Amazon S3) o Third party encryption service Who keeps the key? How much to encrypt? 10/28/2015 jryoo@psu.edu 20

Encryption II Tradeoffs o Security vs. cost Fully homomorphic encryption o Security vs. usability o Security vs. performance o Security vs. complications associated with external auditing efforts 10/28/2015 jryoo@psu.edu 21

Colocation Sharing cost savings but Sharing more security vulnerabilities o Access to the physical hardware Especially, in the context of IaaS o Hypervisor vulnerabilities Xen, VMWare, virtual server, Kernel-based Virtual Machines (KVM), PowerVM, etc. 10/28/2015 jryoo@psu.edu 22

Colocation II Countermeasures o Proper cloud segmentation environments Separate physical servers Dedicated virtual servers Logical partitions and separate database servers on the same VM without sharing a disk storage 10/28/2015 jryoo@psu.edu 23

Cloud Security Solutions 10/28/2015 jryoo@psu.edu 24

The Good News Newly emerging standards and guidelines to evaluate CSPs o How well they are dealing with Cloud-specific security challenges 10/28/2015 jryoo@psu.edu 25

Cloud Security Standards Standards Type Strength Sponsoring Organization SOC Audit for outsourced services Technology-neutral ISO/IEC 27017 Cloud-specific Technologyneutral Cloud Security Alliance PCI-DSS Cloud-specific PCI-qualified security assessor cloud supplement Dedicated to cloud security auditing NIST 800-144 Cloud-specific Technologyneutral Technologyneutral but still providing guidance AICPA ISO NIST CSA PCI-DSS 10/28/2015 jryoo@psu.edu 26

Additional Reading J. Ryoo, Rizvi, S., Aiken, W., and Kissell, J., Cloud Security Auditing: Challenges and Emerging Approaches, IEEE Security and Privacy, vol. 12, no. 6, pp. 68-74, 2014. 10/28/2015 jryoo@psu.edu 27

Any Questions? Contact information o jryoo@psu.edu 10/28/2015 jryoo@psu.edu 28