Compliance in the Cloud

Slides:



Advertisements
Similar presentations
CONFIDENTIAL 1 Preparing for & Maintaining PCI Compliance.
Advertisements

Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
Common Question Who can benefit from Cloud? Every enterprise today can benefit from Cloud.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
Navigating Compliance Requirements DCM 6.2 Regs and Codes linford & co llp.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
1 1 Risk Management: How to Comply with Everything July 11, 2013.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
JARED BIRD Nagios: Providing Value Throughout the Organization.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Security Controls – What Works
Introduction to Cloud Computing and Secure Cloud Computing
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Outsourcing Policy & Procedures An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Security audits. Today’s talk  Security audits  Penetration testing as a component of Security auditing  Different types of information systems security.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
© 2010 RightNow Technologies, Inc. ASU – CABIT – Privacy Day Privacy in the Cloud Ben Nelson CISO, RightNow Technologies.
Information Security Framework & Standards
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
Information Security Technological Security Implementation and Privacy Protection.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
GRC - Governance, Risk MANAGEMENT, and Compliance
Доколку не сакате сами себе си да си помогнете, никој не може да ви помогне IT auditing as a profession at 4 th MASIT Open Days, Skopje 28 th of September.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Roadmap to Maturity FISMA and ISO 2700x. Technical Controls Data IntegritySDLC & Change Management Operations Management Authentication, Authorization.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Working with HIT Systems
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Frontline Enterprise Security
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
OTech CalCloud Security General 1  Meets the operational and compliance requirements of the State  SAM/SIMM  NIST  FedRAMP v2  Other necessary regulatory.
Operational Resilience DR’s Big Data Dilemma September 16, 2015 Datalink IT Resiliency Practice.
The NIST Special Publications for Security Management By: Waylon Coulter.
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
1© Copyright 2016 EMC Corporation. All rights reserved. VIEWTRUST SOFTWARE OVERVIEW RISK MANAGEMENT AND COMPLIANCE MONITORING.
An Information Security Management System
Managing Compliance for All Departments
Information Security Program
Understanding The Cloud
Outsourcing Policy & Procedures
OHIMA 2010.
Regulatory Compliance
Current ‘Hot Topics’ in Information Security Governance Auditing
Risk Management and Compliance
CLM USE GUIDE FOR MICROSOFT TRUSTED CLOUD
Service Organization Control (SOC)
Security in Virtualized Environments
My First Template.
Assessing the Security of the Cloud
Information governance and information security
SMB practice development: Security play
SMB practice development: Security play
HIPAA Security Standards Final Rule
Drew Hunt Network Security Analyst Valley Medical Center
NIST Cloud Computing Reference Architecture
What is an anonymous reporting hotline?
IT Management Services Infrastructure Services
Cloud Computing for Wireless Networks
Presentation transcript:

Compliance in the Cloud Jake Gibson MBA, CISSP, CISM, CISA

Security and Compliance in the Cloud Why is this scary? What are the concerns? Bad experiences? Good experiences? Can we avoid it?

TRUST How do we build trust? Be aware of the pros/cons Validate (tours, compliance reports, TPRM) Clear roles and responsibilities SLA Reviews Ongoing process, TPRM is routine

Cloud Refresher Private Cloud vs Public Cloud What are the primary differences? What are the use cases surrounding each? What security & compliance factors should you take into account when evaluating the right cloud for your business?

Cloud Refresher On Premise Bare Metal Dedicated Infrastructure Shared Infrastructure PaaS/IaaS Biggest differences are Roles & Responsibilities

Resolving Ambiguity Policies/Awareness Training On Prem PaaS SaaS IaaS Policies/Awareness Training Client and End Point Controls Application Security Operating System Security Host/Storage Infrastructure Network Controls Physical Security Resolving Ambiguity Cloud Provider Cloud Customer

A bit about regulated industries HIPAA PCI-DSS SOX GDPR NERC FISMA How does this impact your cloud service provider decisions?

Diving into Cloud Controls Physical Visitor Validation/Entry Multi-Factor authentication Video Surveillance Natural Disaster Protection Power/Environmental Example: Proximity Cards / Cloning

Diving into Cloud Controls Network Firewall IDS/IPS MDR DDoS Protection Segmentation Example: Target, lack of proper network segmentation

Diving into Cloud Controls Hypervisor Isolation Logical Access Patch Management Host-Level Controls Example: Meltdown and Spectre

Diving into Cloud Controls Logical Identity and Access Management Multi-Factor Authentication SIEM Example: Failure to disable/review access permissions

Diving into Cloud Controls Administrative Background Checks Security Awareness Training Technical Training ITSM (ITIL) Processes Example: Misconfigurations and Phishing https://www.ibm.com/security/resources/xforce/xfisi/

But it all depends Policies/Awareness Training On Prem PaaS SaaS IaaS Policies/Awareness Training Client and End Point Controls Application Security Operating System Security Host/Storage Infrastructure Network Controls Physical Security But it all depends Cloud Provider Cloud Customer

Questions to Ask a Potential Cloud Provider What regulations are you compliant with? Are you compliant or certified/audited? Example: Client bounce Do you allow clients to tour your facility? Can I see where my data is? What is your breach notification policy? Have you ever had a breach? Do you offer a point of contact for security & compliance questions? How do you assist clients when they are going through an audit?

Key Roles & Responsibilities to Identify with a Cloud Provider Who does what? What am I still on the hook for? Where does the line get drawn? Does it change for different services? (IaaS, PaaS, SaaS, etc.) Always get it in writing (SLA, MSA, etc.)

The Importance of Routine Reviews Things change. Regular reviews are essential. Does your provider allow it? Many regulations are calling for this. Increasingly stringent requirements around TPRM Frequency is key. 3rd party audit assessments are a great place to start.

Colocation Private Cloud Enterprise Cloud Managed Services Information Security Management System (ISMS) LightEdge’s overall security program Includes policies, procedures, and baseline security controls Internationally recognized Industry independent Maps to NIST 800-53 well Certificate provided to clients Service Management System (SMS) LightEdge’s ITIL program Includes policies & procedures Change Management Configuration Management Incident Response Capacity Management Document & Record Management And more… Internationally recognized Industry independent Certificate provided to clients SSAE 18 SOC 1, 2, & 3 Articulates information about LightEdge’s control environment Financial (SOC 1) Security Availability Integrity Confidentiality Privacy Detailed 3rd party attestation of controls and compliance Widely accepted across many industries Reports provided to clients PCI DSS 3.2 Audit of payment card industry information security requirements Includes LightEdge information security controls Some controls remain the client’s responsibility Required by businesses accepting or processing credit cards Report provided to clients HIPAA AT 101 Attestation Report Independent audit of: HIPAA Security Rule HITECH Breach Notification Requirements Includes LightEdge information security controls Some controls remain the client’s responsibility Required by healthcare industry Report provided to clients Colocation Private Cloud Enterprise Cloud Managed Services

Building Blocks to Successful IT Security TRUST COMPLIANCE VALIDATION ASSISTANCE

How we Build Trust 1. The most secure data centers around Multiple locations with high-speed interconnectivity Comprehensive information security management system 24x7x365 video surveillance with archival footage Physical separation options available Multi-factor biometric authentication

How we Maintain Compliance 2. Data centers that comply with top industry standards & global regulations Rigorous regulatory compliance programs Internationally recognized security controls Third-party audited facilities Validation through annual audit reports

How we Achieve Validation 3. We live by the motto “Trust, but verify.” Third party audit reports provided to clients Thorough physical tours for clients to witness safeguards firsthand

How we Offer Assistance 4. Direct access to the CSO/CCO Trusted advisor willing to spend time with clients to talk through: Gap Analysis Auditor questions Facility tours Compliance control mapping Security best practices