Hi – 5 Marcus Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi Security of Cloud Computing.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate. Presented by: Sabrina M. Segal, USITC, Counselor to the.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
SL21 Information Security Board Mission, Goals and Guiding Principles.
Solutions & Services to ‘Multiply your Business Performance’ 2013.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
Security Controls – What Works
Wally Kowal, President and Founder Canadian Cloud Computing Inc.
Cryptography and Network Security
Does "The Cloud" Fit Into Your Organization? Tom Horan Meridian IT Inc. VP, Strategic Markets (847)
Oyinkan Adedun Adeleye Caitlyn Carney Tyler Nguyen.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
MIGRATING INTO A CLOUD P. Sai Kiran. 2 Cloud Computing Definition “It is a techno-business disruptive model of using distributed large-scale data centers.
Jordan Wissel Eric Lewis Sarah Basile. Introduction This presentation will analyze: Overview/History Implementation Advantages/Disadvantages Security.
Security issues in the Cloud Presentation for CloudCamp 2012 (Lagos) Christopher Odutola FVC Inc. Dubai.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
SEC835 Database and Web application security Information Security Architecture.
Jim Reavis, Executive Director Cloud Security Alliance November 22, 2010 Developing a Baseline On Cloud Security.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
HIPAA COMPLIANCE WITH DELL
Dell Connected Security Solutions Simplify & unify.
Computer Science and Engineering 1 Cloud ComputingSecurity.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Overview Abstract Vulnerability: An Overview Cloud Computing Cloud-Specific Vulnerabilities Architectural Components and Vulnerabilities Conclusion.
In the Cloud How to Address Security in the Cloud.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Top Threats WG Co-Chair Jon-Michael Brook. Agenda About our Top Threats Polling the industry Call for participation Categorizing our Top Threats.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Robert Mahowald August 26, 2015 VP, Cloud Software, IDC
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
By: Joshua Wiegand. Overview ● What is the cloud computing? ● History of Mobile Computing ● Service Models ● Deployment Models ● Architecture ● Security.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
Managed IT Services JND Consulting Group LLC
 December 2010 US Chief Information Officer Vivek Kundra released the Federal Cloud Computing Strategy. This became to be what is known as “Cloud First”
Application Of Cloud Computing On Cooperative Supply Chain Management
Lecture 6: Cloud Computing
Understanding The Cloud
Avenues International Inc.
VIRTUALIZATION & CLOUD COMPUTING
Security Standard: “reasonable security”
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Paul Woods Chair, MITIGATION: Ensuring we procure cloud services taking into account of the risks involved Paul Woods Chair, ISNorthEast.
Cloud Computing Kelley Raines.
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Cloud Security An IaaS Story 2018 © Netskope. All rights reserved.
Developing a Baseline On Cloud Security Jim Reavis, Executive Director
INFORMATION SYSTEMS SECURITY and CONTROL
CONTENTS BACKGROUND CLOUD MODELS SECURITY CONSIDERATIONS MANAGING RISK.
CSCE 715: Network Systems Security
Computer Science and Engineering
Introduction to the PACS Security
IT Management Services Infrastructure Services
Cloud Computing for Wireless Networks
Presentation transcript:

Hi – 5 Marcus Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi Security of Cloud Computing

Topic Overview Introduction Cloud Basics Securing the Cloud Leveraging the Cloud Final Recommendations

Introduction Cloud Computing Industry is growing According to Gartner, worldwide cloud services revenue is on pace to surpass $56.3 billion in 2009, a 21.3% increase from 2008 revenue of $46.4 billion, according to Gartner, Inc. The market is expected to reach $150.1 billion in Businesses are increasing Cloud adoption "We expect a great deal of migration towards cloud computing within the federal government in addition to the already robust private sector growth. The growth of the cloud should not outpace our ability to protect the data that goes into it..." ~ Former White House advisor Paul Kurtz, partner with Good Harbor Consulting, LLC How can IT leaders ensure security in the cloud?

Cloud Basics Cloud Characteristics Service Models SaaS IaaS PaaS Deployment Models Public Private Community Hybrid

Cloud Characteristics

Cloud Service Models Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS)

Natural Evolution of the Web Source: Lew Tucker, Introduction to Cloud Computing for Enterprise Users

Four Deployment Models

Securing the Cloud Security Interaction Model Top Security Threats Cloud Provider Security Practices – Google Case Study

Security Interaction Model

Top Security Threats Abuse and nefarious use of cloud computing Insecure interfaces & APIs Unknown risk profile Malicious insiders Shared technology issues Data loss or leakage Account or service hijacking

Abuse and nefarious use of cloud computing Stricter initial registration and validation processes. Enhanced credit card fraud monitoring and coordination. Comprehensive introspection of customer network traffic. Monitoring public blacklists for ones own network blocks. Insecure interfaces & API s Analyze the security model of cloud provider interfaces. Ensure strong authentication and access controls are implemented in concert with encrypted transmission. Understand the dependency chain associated with the API. Unknown risk profile Disclosure of applicable logs and data. Partial/full disclosure of infrastructure details Monitoring and alerting on necessary information. Threat Mitigation

Malicious insiders Enforce strict supply chain management and conduct a comprehensive supplier assessment. Specify human resource requirements as part of legal contracts. Require transparency into overall information security and management practices, as well as compliance reporting. Determine security breach notification processes. Shared technology issues Implement security best practices for installation and configuration. Monitor environment for unauthorized changes/activity. Promote strong authentication and access control for administrative access and operations. Enforce service level agreements for patching and vulnerability remediation. Conduct vulnerability scanning and configuration audits. Threat Mitigation

Data loss or leakage Implement strong API access control. Encrypt and protect integrity of data in transit. Analyze data protection at both design and run time. Implement strong key generation, storage and management, and destruction practices. Contractually demand providers wipe persistent media before it is released into the pool. Contractually specify provider backup and retention strategies. Account or service hijacking Prohibit the sharing of account credentials between users and services. Leverage strong two-factor authentication techniques where possible. Employ proactive monitoring to detect unauthorized activity. Understand cloud provider security policies and SLAs. Threat Mitigation

Google Security Practices Organizational and Operational Security Data Security Threat Evasion Safe Access Privacy

Google Organizational and Operational Security Holistic approach to security Security team Develop with security in mind Regularly performs security audits and threat assessments Employees screened, trained Works with security community and advisors

Google Data Security Google Code of Conduct – Dont be evil. Physical security Logical Security Accessibility Redundancy

Google Threat Evasion Spam and virus protection built into products Protects against application & network attacks

Google Safe Access Avoids local storage Access controls Encrypted connections Integrated security

Google Privacy Privacy policy Does not access confidential user data Does not alter data Maintain own IP rights Indemnification, liability End of use

Leveraging the Cloud Decision Making Process Clan Wars Case Study

Decision Making Process Identify the asset for cloud deployment Evaluate the asset requirements for confidentiality, integrity, and availability Map the asset to potential cloud deployment models Evaluate potential cloud service models and providers Sketch the potential data flow Draw conclusions

Case Study: Clan Wars Company Profile Online multiplayer game In Browser Flash Processes credit card payments

Case Study: Clan Wars Decision Making Process Identified all components as candidates Evaluation concluded: Payment = High concern on all factors Game & data = Medium on all factors Primary components mapped: Infrastructure (Servers, storage, etc) Payment Processing Collaboration

Case Study: Clan Wars Data Flow

Case Study: Clan Wars Conclusion Great fit Risk requirements met Data flow supports needs Added benefits Low cost (saving ~$500/month) Low maintenance Performance

Final Recommendation No universal answer Evaluate your security needs versus the capabilities of the provider

Q & A

Supplemental Material The sections that follow will not be covered during the presentation but are included for reference.

Rackspace Security Practices Physical Security System Security Operational Infrastructure Security Client Application Security

Cloud Consumer Best Practices Operational Domains Traditional Security, Business Continuity, and Disaster Recovery Data Center operations Incident Management Application security Encryption & Key Mgmt Identity & access Mgmt Virtualization Governance Domains Governance & Enterprise Risk Mgmt Legal and Electronic Discovery Compliance and Audit Information Life Cycle Management Portability and Interoperability