Cloud Computing Risks & Reality. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com



Similar documents
Client Security Risk Assessment Questionnaire

Cloud Security and Managing Use Risks

Information Technology: This Year s Hot Issue - Cloud Computing

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

BMC s Security Strategy for ITSM in the SaaS Environment

University of Pittsburgh Security Assessment Questionnaire (v1.5)

THE BLUENOSE SECURITY FRAMEWORK

HEC Security & Compliance

Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World

Small Business IT Risk Assessment

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

Cloud Risk Management: How to Consolidate your CSP and Corporate Risk Profile

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014

Cloud Computing Safe Harbor or Wild West?

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Cloud models and compliance requirements which is right for you?

Supplier Security Assessment Questionnaire

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

Logging In: Auditing Cybersecurity in an Unsecure World

Cloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs

Securing The Cloud With Confidence. Opinion Piece

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Security Controls What Works. Southside Virginia Community College: Security Awareness

A Decision Maker s Guide to Securing an IT Infrastructure

Cloud Security Who do you trust?

VENDOR MANAGEMENT. General Overview

Data Privacy, Security, and Risk Management in the Cloud

Secure Cloud Hosting for Healthcare Organizations

5 things to consider when designing a security strategy for the Cloud William Crank, MEDHOST, Blake Sutherland, VP, Enterprise Business, Trend Micro

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

PCI Requirements Coverage Summary Table

Hans Bos Microsoft Nederland.

Anypoint Platform Cloud Security and Compliance. Whitepaper

SECURITY RISK MANAGEMENT

How To Protect Your Cloud Computing Resources From Attack

Securing the Service Desk in the Cloud

PCI-DSS Penetration Testing

Security Considerations

KeyLock Solutions Security and Privacy Protection Practices

John Essner, CISO Office of Information Technology State of New Jersey

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

INFORMATION TECHNOLOGY SECURITY STANDARDS

The Education Fellowship Finance Centralisation IT Security Strategy

Keyfort Cloud Services (KCS)

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Security. Are you on the train or the tracks? ISSA CISO Executive Forum April 18, Brian Grayek CISSP, CCSK, ITILv3

A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cloud Services Overview

GoodData Corporation Security White Paper

CONSIDERATIONS BEFORE MOVING TO THE CLOUD

Big Data, Big Risk, Big Rewards. Hussein Syed

Whitepaper. What You Need to Know About Infrastructure as a Service (IaaS) Encryption

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

CONTENTS. Security Policy

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Security Threat Risk Assessment: the final key piece of the PIA puzzle

Security & Infra-Structure Overview

All Clouds Are Not Created Equal THE NEED FOR HIGH AVAILABILITY AND UPTIME

Secure, Scalable and Reliable Cloud Analytics from FusionOps

PCI Compliance for Cloud Applications

Enterprise Architecture Review Checklist

ISO Controls and Objectives

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Security from a customer s perspective. Halogen s approach to security

Georgia Institute of Technology Data Protection Safeguards Version: 2.0

The Elephant in the Room: What s the Buzz Around Cloud Computing?

SSAE 16 for Transportation & Logistics Companies. Chris Kradjan Kim Koch

Security Issues in Cloud Computing

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Securing the Physical, Virtual, Cloud Continuum

Transcription:

Cloud Computing Risks & Reality Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com

What is Cloud Security The quality or state of being secure to be free from danger & minimize risk To be protected from adversaries A successful Cloud implementation should have multiple layers of security in place: Physical security Personal security Operations security Communications security Network security

Cloud Business Governance Organizations need a set of capabilities that are essential when effectively implementing and managing cloud services that include the following: Demand Management Relationship Management Data Security Management Application Lifecycle Management Risk & Compliance Management

Compliance Requirements Data Regulatory Compliance Requirements General Data Protection Regulation (EU GDPR) Privacy By Design Personal Data Protection Law, Latvia Freedom of Information Law, Latvia Payment Card Industry (PCI DSS 3.0) In addition, each Country has its own legal and regulatory compliance requirements

Data Security Data Types Personal Health Information (PHI) Personal Identifiable Information (PII) Credit Card Data (PCI) Senior Management is Accountable for Data and Information Security & Privacy

Privacy by Design

Privacy by Design

Business and IT Working Together Risk Management Legal Audit Compliance Privacy Business Continuity Quality Control Facilities Human Resources Information, IT and Physical Security Emergency Management

To the Cloud What to think about

How to Choose a Provider Choose a provider you can trust and people you trust in key positions. Ask people in your network about their successful and unsuccessful relationships. Learn how the providers behaved when things went wrong. (They are all great when things are going well.) Learn how the provider responded when their customer was wrong or made a mistake. The last two will likely tell you much more than what is in their service agreement. Review Audit Compliance Reporting ISO 27001, SSAE 16, SOC-1, SOC-2, SOC-2, PCI-DSS

Questions What do the terms "continuity" and "recovery" mean? What constitutes a breach? How long should it take to restore service? What options do you have if it is taking too long? Can you go somewhere else? Who gets to decide whether you can exit? How is "too long" defined? Can you have your data back? In what form and format? When can you have it? How will it be delivered?

Questions and More Questions And what happens to your data, software, and systems if the provider becomes insolvent or subject to prosecution? What happens to your data if you don't pay your provider? Who owns your information and your systems then? Can your provider shut you down and/or permanently delete your data if you withhold payment? If you are thinking that is not a possibility... could it happen in the event you are having a dispute related to billing or service?

Exit Strategy? If you fail to plan, you plan to fail! Have an exit strategy. More than that, understand what would cause you to execute it. How long can something be down (or slow...) before it impacts your business? How long will it take to implement even a temporary exit? How will the provider help? How can you return to the provider's service (should you decide to) once the problem has been resolved? Who gets to decide whether you return?

Know What You Need Know what you want It is important to perform that second order thinking ahead of time. Know what you need It may be different than what you want Read & know what is in the service agreement Know how to engage It is not only about the negotiation and the remedies Someone needs to be familiar with how to identify a breach or issue, and how to engage the provider for assistance Know what to do both in cases where the provider has an issue, as well as those cases where the customer has caused a problem

Never Make Assumptions Do not assume the service provider will think of everything It all goes back to Know what you need

Cloud Service Providers and their Data Centres

Cloud Data Centres Where your data is makes a difference Yes, your data in a cloud does have a location (or many locations) As a Canadian Public or Private Corporation, once your Data leaves Canadian soil, it is governed by the Laws and Regulations of the Country that it resides in. Each organization must understand the risks and implications associated to their data storage location. You are subject to the jurisdiction your data is in and passing through

Cloud Data Centres One way or another your Cloud data is in a Data Centre What Affects the Data Centre affects You The Data Centre can be Affected by Two Factors: Natural Factors: Floods, Earthquakes, Tornadoes, Drought and Fire, Storms, Snow etc, Human Factor: Riots, Political Protest, Sports Events

Cloud Data Centres Are your data centres geographically clustered? Can one event take all of your cloud servers and their data paths out? Is it on a fault line?

Cloud Data Centres

Cloud Data Centres Bottom Line Every question you would ask about the physical location of data, hardware and Apps on your own server You must ask about your CLOUD based servers. You Cannot Outsource Responsibility

Even when you ask all the right questions

Case Study #1 Hosted Website Scenario Platform as a Service Vendor ISO 270001 Certification Applications and Data Client Service Level Agreement in Place Intrusion Detection Log Monitoring Vulnerability Management System Patch Management

Case Study #1 Hosted Website Findings Interviewed the Service Provider for Security Controls Data Centre was recently acquired by a large service provider with ISO 27001 Compliance Service Level Agreement was not reality No Intrusion Detection No Log Monitoring No Vulnerability Management No System Patch Management No Change Management

Case Study #2 EMR Implementation Scenario Tender for Cloud Based Electronic Medical Record (EMR) System Included Security Requirements Threat Risk Assessment Privacy Impact Assessment Contractual Obligations Privacy Breach Return of Data Data Residency required in Native Country

Case Study #2 EMR Implementation Findings Lowest Bid Cloud based EMR Vendor Awarded Tender Awarded Cloud Vendor Executed Contract Privacy Impact Assessment Performed Threat Risk Assessment Performed Cloud EMR Vendor found to be in Breach of Contract Data residency outside of Native Country Still in Negotiations

Case Study #3 Network System Integration Scenario Review of Network Architecture, Infrastructure, Systems and Services Network Design Created over 10 Years ago Implementation of Point Solutions WiFi, Various SaaS Application, Various Legacy Systems, Payment System, VLANs, IP Security Cameras, Corporate

Case Study #3 Network System Integration Findings No Separation of Networks, System, Applications and Infrastructure based on data sets and compliance requirements No Password Changes Due to Complex Application Integration LDAP Authentication in Clear Text No Network Infrastructure/Security Strategy No Business Process and Application Integration Strategy

Questions