Incident Handling in the Cloud and Audit s Role



Similar documents
Cloud Computing; What is it, How long has it been here, and Where is it going?

Developing a Risk-Based Cloud Strategy

Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

IS PRIVATE CLOUD A UNICORN?

Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Managing Cloud Computing Risk

Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate.

Hybrid Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

CSO Cloud Computing Study. January 2012

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

The NIST Definition of Cloud Computing


The NIST Definition of Cloud Computing (Draft)

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

CLOUD ARCHITECTURE DIAGRAMS AND DEFINITIONS

Legal Issues in the Cloud: A Case Study. Jason Epstein

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Security Issues in Cloud Computing

Enterprise Governance and Planning

Cloud Services Overview

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

Session 5. Mixing and matching Public, Private and Hybrid Clouds for maximum benefits

White Paper on CLOUD COMPUTING

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

WHAT S ON YOUR CLOUD? Workload Deployment Strategies for Private and Hybrid Clouds RESEARCH AND ANALYSIS PROVIDED BY TECHNOLOGY BUSINESS RESEARCH

Cloud Computing An Auditor s Perspective

IBM EXAM QUESTIONS & ANSWERS

LEGAL ISSUES IN CLOUD COMPUTING

Capability Paper. Today, aerospace and defense (A&D) companies find

NCTA Cloud Architecture

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

ADOPTING CLOUD COMPUTING AS AN ICT DEPLOYMENT STRATEGY FOR DELIVERING SERVICES IN THE GOVERNMENT

The HIPAA Security Rule: Cloudy Skies Ahead?

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

Kent State University s Cloud Strategy

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

NIST Cloud Computing Reference Architecture

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

Where in the Cloud are You? Session Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle)

Cloud Computing Technology

A white paper from Fordway on CLOUD COMPUTING. Why private cloud should be your first step on the cloud computing journey - and how to get there

Cloud Computing. What is Cloud Computing?

Virtualization Impact on Compliance and Audit

Seeing Though the Clouds

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT

AskAvanade: Answering the Burning Questions around Cloud Computing

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Strategies for Secure Cloud Computing

Cloud Computing Security Issues

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

What Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen

Hybrid Cloud Computing

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

On Premise Vs Cloud: Selection Approach & Implementation Strategies

Cloud for Credit Unions Leveraging New Solutions to Increase Efficiency & Reduce Costs Presented by: Hugh Smallwood, Chief Technology Officer

Information Technology: This Year s Hot Issue - Cloud Computing

Securing Oracle E-Business Suite in the Cloud

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.

Secure Cloud Computing

Expert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II

Microsoft SharePoint Architectural Models

Addressing Security for Hybrid Cloud

Time to Value: Successful Cloud Software Implementation

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

How to Turn the Promise of the Cloud into an Operational Reality

Cloud Computing in a Regulated Environment

Cloud service model provides levels of abstraction and automation for those tasks

CLOUD COMPUTING SECURITY CONCERNS

Addressing Data Security Challenges in the Cloud

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

VIRTUALIZED WEB DESKTOP Towards a Faster Web Cloud Operating System

and Deployment Roadmap for Satellite Ground Systems

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

The cloud - ULTIMATE GAME CHANGER ===========================================

12/1/2014. Cybersecurity and Cloud Services Compliance Considerations. Community Medical Centers. Cedars-Sinai. Dec. 5, 2014 San Francisco

Cloud Computing Submitted By : Fahim Ilyas ( ) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

20 th Year of Publication. A monthly publication from South Indian Bank.

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Bringing the Cloud into Focus. A Whitepaper by CMIT Solutions and Cadence Management Advisors

INFRASTRUCTURE AS A SERVICE BUYER S CHECKLIST

Transcription:

Incident Handling in the Cloud and Audit s Role David Cole, CPA, CISA ISACA National Capital Area Chapter Cloud Computing Conference March 17, 2015 1

Outline Cloud Service Models Cloud Types Summary of Controls Incident Scenario Example Audit Involvement and Role IH Standards Audit Involvement in the IH Process IH Example with Audit Involved Post Incident Audit Value Wrap Up 2

Cloud Service Models Software as a Service (SaaS) The capability provided to the consumer by using the cloud provider s applications running on a cloud infrastructure Applications are accessible through a thin client interface, such as a web browser (e.g., web-based email), or a program interface Consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or applications SaaS is termed a turn-key service for various applications Main benefits are reducing the total cost of hardware and software development, maintenance, and operations Security provisions are carried out by the cloud provider Cloud consumer does not manage or control the underlying cloud infrastructure or applications Some limited administrative application settings 3

Cloud Service Models Platform as a Service (PaaS) Capability provided to deploy on the cloud infrastructure consumer- created or acquired applications created using programming languages, libraries, services, and tools supported by the provider Consumer does not manage or control the cloud infrastructure network, servers, operating systems, or storage Consumer does control the deployed applications and configuration settings for the application-hosting environment Cloud consumer has control over applications and application platform settings Advantages are reducing the cost and complexity of buying, housing, and managing the underlying hardware and software components of the platform Security is shared by the cloud provider and the consumer 4

Cloud Service Models Infrastructure as a Service (IaaS) Processing provisioning of, storage, networks, and other resources Consumer is able to deploy and run arbitrary software Includes operating systems and applications Consumer does not manage or control the underlying cloud infrastructure Consumer does control operating systems, storage, and deployed applications; and control of select networking components -host firewalls Cloud consumer generally has broad choices of operating system and development environment for hosting Security is provisioned beyond the basic infrastructure and managed by the cloud consumer 5

Cloud Types Public Cloud Cloud infrastructure is provisioned for open use by the general public May be owned, managed, and operated by a business, academic, or government organization, or some combination of them Cloud provider owns infrastructure Deployment models broadly characterize the management and disposition of computational resources for delivery of services to consumers, as well as the differentiation between classes of consumers Infrastructure and computational resources are available to the general public over the Internet Owned and operated by cloud provider delivering cloud services to consumers Is external to the consumers organizations 6

Cloud Types Private Cloud Cloud infrastructure is provisioned exclusively for use by a single organization Used by multiple consumers - business units may be owned managed operated by the organization third party may exist on or off premises It may be managed by the organization or by a third party, and may be hosted within the organization s data center or outside of it Gives the organization greater control over the infrastructure, computational resources 7

Cloud Types Community Cloud The cloud infrastructure is provisioned for exclusively is to a specific community of consumers Organizations may have shared mission, business, security requirements, policy, and compliance considerations May be owned, managed, and operated by one or more organizations within the community or a third party, or some combination of them Can exist on or off premises A community cloud falls between public and private clouds with respect to the target set of consumers Similar to a private cloud except infrastructure and computational resources are exclusive to two or more organizations that share common privacy, security, and regulatory considerations, rather than a single organization 8

Cloud Types Hybrid Cloud Cloud infrastructure is a combination of two or more different cloud infrastructures -private, community, or public Each remain separate cloud entities Often bound together by standardized or proprietary technology that enables data and application portability Hybrid clouds are complex compared to other deployment models Involve a composition of two or more clouds -private, community, or public 9

Cloud Types 10

Summary of Controls **An organization can transfer workload to cloud, 11 but not the responsibility to protect.**

Incident Scenario Example Sales and Marketing have several apps in hybrid cloud and interconnected to in-house infrastructure environment Beaconing activity discovered and popping up daily, randomly, at different times and duration from sales and marketing dept. IPs Netflow analyses easily reveals months of beaconing activity coming from internal Sales and Marketing Systems, cloud IPs uncertain if beaconing Appear in firewall logs to have external IP activity Initial incident research reveals IPs from known APT addresses Initial network/app IDS and IPS are running and no event triggers sent Perimeter FW, DMZ, web servers, also not sent event trigger warnings No FW blocking decision made (deciding on whether memory capture or cut the network of subnets involved) As an IT Auditor you might get asked to support and participate in the IH/Event Do you accept the assignment? Why and why not? 12

Incident Scenario Example Audit Involvement Assume you re drafted you are participating and involved! Until further notice Audits Role and maintaining the office independence Audit Independence Audit Objectivity Audit as Risk Advisor 13

IH Standards - ITIL 14

IH Standards - ITIL 15

IH Standards - NIST 16

Audit Involvement in IH Process How and when to inject and retract from the IH process Initial Meeting: set the ground rules, always repeat the ground rules until completion Keep your independence, don t direct actions, don t criticize a fluid process, state the obvious risks when appropriate Establish and maintain a log of your participation and involvement your involvement and your feedback will be valued during Incident Response and during post mortem activities 17

Audit Involvement in IH Process How and when to inject and retract from the IH process Be prepared: know your organization business; know the business processes; know the business data, types, and flows; know the organization integration points; think out of the box of an auditor Keep your leadership informed and up-to-date; state the facts, caveat when uncertain recognize you won t have all information 18

IH Example with Audit Involved IH Program Exist and is it practiced IH Up-to-Date under Hybrid Cloud environment Who s in-charge of Incident Response (IR) What is communication plan during, internal, and external, plus media and law enforcement Is the IH team clearly communicating activity and status to date don t assume all is ok 19

IH Example with Audit Involved Cloud Security Risks Data in cloud loses some of its visibility to control What SAAS security controls is cloud provider providing? Data has moved to cloud Is there a Cloud Data Protection solution established? Data encryption- On-premise, in-transit, in-cloud Is there a cloud encryption gateway put in place? If so, on premise or in cloud? Does Cloud Provider capture activity logs and can we get them now! Have we been getting them? 20

IH Example with Audit Involved System Interconnections Are we in a hybrid cloud and sharing cloud services or cloud applications with partners, vendors, clients? Was the breach internal or through a third party? What does our interconnected service agreement say on notification responsibility both parties? Mobile Solutions Incident involves Sales, is there a mobile solution for Sales work force and how is it being assessed? 21

IH Example with Audit Involved Network Traffic Analyses When/how decision to stop/block the beaconing Have files been transferred into environment from external IPs? Was beaconing done through a SSL tunnel? Provides a level of sophistication. Why didn t monitoring tools trigger the event? Firewall and web services, have the configurations been altered? 22

Post Incident Audit Value Risk Advisor Business Technology Advisor Internal Control and Business Process Re-engineer Honest Broker to Senior Leadership What went well, what did not Post recovery verifier and validator 23

Wrap Up Questions? 24