How To Write A Cloud Security Framework



Similar documents
Cloud Security Framework (CSF): Gap Analysis & Roadmap

Cloud Security Framework (CSF): Gap Analysis & Roadmap

Virtual Desktop Infrastructure (VDI)

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

WHITEPAPER. Compliance: what it means for databases

Cloud Computing Security Issues

Lucent VPN Firewall Security in x Wireless Networks

SOLUTIONS. Secure Infrastructure as a Service for Production Workloads

OpenNebula Open Souce Solution for DC Virtualization. C12G Labs. Online Webinar

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Lecture 02b Cloud Computing II

APV9650. Application Delivery Controller

Clavister InSight TM. Protecting Values

NET ACCESS VOICE PRIVATE CLOUD

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

TABLE OF CONTENTS NETWORK SECURITY 2...1

Cloud Infrastructure Planning. Chapter Six

EARTHLINK BUSINESS. Simplify the Complex

Alliance Key Manager Solution Brief

Hosting Services VITA Contract VA AISN (Statewide contract available to any public entity in the Commonwealth)

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Advanced Higher Computing. Computer Networks. Homework Sheets

vshield Administration Guide

OpenNebula Open Souce Solution for DC Virtualization

Network performance in virtual infrastructures

AppDirector Load balancing IBM Websphere and AppXcel

OpenNebula Open Souce Solution for DC Virtualization

CompTIA Network+ (Exam N10-005)

IT Networking and Security

Content Distribution Management

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

Figure 41-1 IP Filter Rules

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

Building Energy Security Framework

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

Stateful Inspection Technology

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, :32 pm Pacific

IBM EXAM QUESTIONS & ANSWERS

Security Controls What Works. Southside Virginia Community College: Security Awareness

Web Application Firewall

Appendix C Pricing Index DIR Contract Number DIR-TSO-2724

Lab Organizing CCENT Objectives by OSI Layer

Cisco IOS Firewall. Scenarios

Cyberoam Perspective BFSI Security Guidelines. Overview

Availability Digest. Redundant Load Balancing for High Availability July 2013

vcloud Director User's Guide

Certified Information Systems Auditor (CISA)

Securing Networks with PIX and ASA

APV x600 Series. Application Delivery Controller APV1600, APV2600, APV4600, APV5600, APV6600, APV8600, APV9600

Proof of Concept Guide

Visions of Clouds and Cloud Security. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

WHITE PAPER MICROSOFT LIVE COMMUNICATIONS SERVER 2005 LOAD BALANCING WITH FOUNDRY NETWORKS SERVERIRON PLATFORM

Network Access Control and Cloud Security

locuz.com Professional Services Security Audit Services

Network System Design Lesson Objectives

What Cloud computing means in real life

SECURE CLOUD COMPUTING

Security Overview Enterprise-Class Secure Mobile File Sharing

Trend Micro. Advanced Security Built for the Cloud

How To Write A Virtual Desktop Infrastructure (Vdi) Protocol Problem Statement For Iet-81

Solutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access.

With Eversync s cloud data tiering, the customer can tier data protection as follows:

Radware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic

CloudDesk - Security in the Cloud INFORMATION

Hitachi Virtual Storage Platform Family: Security Overview. By Hitachi Data Systems

December P Xerox App Studio 3.0 Information Assurance Disclosure

Knowledgebase Solution

Enterprise Computing Solutions

White Paper on CLOUD COMPUTING

VMware vsphere Design. 2nd Edition

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Apigee Gateway Specifications

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Lab Developing ACLs to Implement Firewall Rule Sets

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Cloud Models and Platforms

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Specialized Programme on Internetworking Design and LAN WAN Administration

VMware vcloud Automation Center 6.1

Cisco Networking Professional-6Months Project Based Training

CSCI 362 Computer and Network Security

Cloud Security. DLT Solutions LLC June #DLTCloud

custom hosting for how you do business

Information Technology Solutions

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Managing Cloud Computing Risk

Data Security In The Cloud

Secure Cloud Computing through IT Auditing

Cloud Architecture and Management. M.I. Deen General Manager (Enterprise Solutions) Sri Lanka Telecom

Load Balancing SIP Quick Reference Guide v1.3.1

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

CTS2134 Introduction to Networking. Module Network Security

Small, Medium and Large Businesses

MCSE SYLLABUS. Exam : Managing and Maintaining a Microsoft Windows Server 2003:

Transcription:

Cloud Security Framework (CSF): Gap Analysis & Roadmap Contributors: Suren Karavettil, Bhumip Khasnabish Ning So, Gene Golovinsky, and Meng Yu Please send comments & suggestions to Suren Karavettil (surenck@gmail.com) January 07 th, 2010 01/07/2011 1

IETF IPR and Copyright Statements This document (future Internet-Draft) is being prepared for IETF in full conformance with the provisions of BCP 78 and BCP 79 Copyright Notice Copyright (c) 2010 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents in effect on the date of publication of this document (http://trustee.ietf.org/license-info) 01/07/2011 2

Purpose Outline Cloud Reference Framework Diagram OSI Layers Cloud Service Components Cloud Service Provider (CSP) Resources Content Data Types Cloud Service Usage Actors CSP Services Requirements Categories Administration & Management Requirements Application Services Operations Requirements Governance, Risk & Compliance Requirements Infrastructure Services Requirements Gap Analysis Other Standards Development Organizations (SDO) Roadmap Next steps 01/07/2011 3

Purpose The purpose of the Cloud Security Framework: Gap Analysis & Roadmap is to come up with requirements for: Protocol & Profiles Interfaces API s That helps develop & provide secure applications for users and reduce human interventions in provisioning & management of resources for these cloud applications & services. 01/07/2011 4

Focus areas Gap Analysis & Roadmap 01/07/2011 5

OSI Layers Relevance to Cloud Layers impacted by Cloud based services model Application Layer Processes & Apps - HTTP, SMTP, VoIP, IPTV, Telnet, FTP, NFS, NIS Presentation Layer Data Representation & Encryption - SSL/TLS, VPN Session Layer Inter-host communication - P2P, SIP Data link Layer - Ethernet WAN Layers minimally impacted Transport Layer TCP, UDP Network Layer IP + ARP/RARP/ICMP Physical Layer Media - Fiber Optics 01/07/2011 6

Cloud Service Components Resources Assets & Personnel Application Services Users & Access Control Inter-operability (across CSPs) Infrastructure Management & Operational Services These components mentioned above can be classified based on: Cloud Client Side (thick client, mobile), Cloud Server (Hosting) Side and Cloud Network Infrastructure CloudApps and CloudOps Category of Cloud Services provided 01/07/2011 7

Cloud Service Provider (CSP) Assets Hard Assets Categories Resources Computer Assets Processors, Memory, etc Storage Assets Disks, etc Network Elements - Routers, Switches, Load Balancers, Firewalls Appliances, cell towers, etc Mobile Devices smart phones, pads, etc Device Assets Cameras, Access Card Readers, RFID Tags, etc Others Soft Assets Categories Software(s) and their licenses OS, High Level Language(s) IDE & Runtime Server side - Application Servers, Databases Mobile & Client side software Network - Firewalls, VPN, etc Virtual Assets Users Personnel Administrators Management Security Guards Maintenance Employees Their vendors, etc Database Connection Pools Clusters, Load Balancers Bandwidth, Frequency, VLANs 01/07/2011 8

Cloud Content Data (MIME) Types Live Web Application Form Data (Structured text/html) Image Voice Video Attachments (unstructured/mime data types) Unstructured data Archive Structured Data (Database, etc) Files Data PDF, DOC, Excel, etc Image - JPEG, GIF, PNG, etc Voice archive MP-3, etc Video Archive MPEG-4, MPEG-2, MJPEG, AVCHD, etc Unstructured data 01/07/2011 9

Cloud Service Usage Actors Public/Enterprise Cloud Application Services Users Cloud Application Services Providers (CASP) Development Organization (Enterprise) Development Users System Administration Users Management Users CSO, CIO, Engineering CASP Enterprise & Cloud Service Provider(s) (CSP) System Administration Users Network Administration Users Management Users CXO, etc Others Peer CSP, Regulators & Compliance Auditors Investigations & Forensics 01/07/2011 10

CSP Services Requirements Categories Administration & Management (A&M) Allocation, Status, Statistics Application Services Operations (ASO) Governance, Risk & Compliance (GRC) Governance, Risk Assessment & Mitigation, Compliance Infrastructure Management & Operations Services (IMOS) 01/07/2011 11

Administration & Management (A&M) Requirements Computer Resource Allocation Services System, Storage, etc Connectivity Resource Allocation Services Routing, VLAN, etc Failover & Performance Resources Allocation Services Load Balancing, etc Service Mobility Resources Allocation Services Availability, etc Security Configuration Services Identity Management, Access Control, Transport Layer, Encryption, etc Management Services Asset tracking, Status & Statistics of various Services 01/07/2011 12

Application & Services Operations (ASO) Requirements Runtime user authentication & session management Authorized access to data and resources Secure token identifiers for applications, instances of systems (servers), device types (clients), request/response (pages), etc Sanitized data (user or systems) input into applications (from Browsers, CLI, Web Services, etc to avoid injection into OS, SQL, LDAP, etc). Validated and appropriately escaped data output to the clients (browser, CLI, etc) Securing the persistent data/ information Use of authenticated and encrypted transport layer for apps network traffic Inter-operability across CSP s Applications usage of services across CSP s. Seamless secure configuration of applications. Secure forwards and redirects of requests. Multi-tenant isolation Track access and usage of services, data and other resources (auditing & logging) 01/07/2011 13

Governance, Risk & Compliance (GRC) Requirements Payment Card Industry (PCI) Data Security Standards (DSS) PCI DSS Health Insurance Portability & Accountability Act (HIPAA) Sarbanes Oxley Act (SOX) Personal Identification Information (PII) - Massachusetts Regulation 201 CMR 17.00 SAS 70 Auditing Standards NERC CIP Standards Gramm Leach Bliley Act (GLBA) for Financial Services GRC applies to CSP and their clients 01/07/2011 14

Infrastructure Management & Operations Services (IMOS) Requirements Interoperability across CSP s (import/export) Backup & Recovery of information Business continuity planning Resources Tracking (assets scan) Manage personnel access to assets/resources by business hours, location, etc. Track assets/resources. 01/07/2011 15

Gap Analysis Work in progress 01/07/2011 16

Other Standards Development Organizations (SDO) Cloud Security Alliance (CSA) VMWare s DMTF vcloud API & Open Virtualization Format (OVF) TM Forum s Cloud Program Open Cloud Computing Interface Working Group Amazon EC2 API Sun s Open Cloud API Rackspace API GoGrid API 01/07/2011 17

Roadmap Next Steps 01/07/2011 18