Cloud Security Assessment. 2 CoE IT Leadership.- Progress report Introduction »Cloud computing is an approach in which infrastructure and software resources.

Slides:



Advertisements
Similar presentations
A Flexible Cloud-Computing Platform Focus on solving business problems
Advertisements

HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Tunis, Tunisia, June 2012 Privacy in Cloud Computing Vijay Mauree, Programme Coordinator, TSB, ITU ITU Workshop on Cloud Computing.
Considerations in an Outsourced / Cloud World ARMA Information Management Symposium Bill Wilson, Chief Privacy Technologist.
Pros and Cons of Cloud Computing Professor Kam-Fai Wong Faculty of Engineering The Chinese University of Hong Kong.
Hi – 5 Marcus Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi Security of Cloud Computing.
1. 2 August Recommendation 9.1 of the Strategic Information Technology Advisory Committee (SITAC) report initiated the effort to create an Administrative.
The printing drain… 60% of SMBs rely on printing 50% say colour volumes growing 60% say consumables expenditure growing.
Cloud Governance.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
NORMAPME ISO User Guide for European SMEs The essence of.
Cloud computing security related works in ITU-T SG17
The Gathering Cloud computing - Legal considerations David Goodbrand, Partner 28 February 2013 Aberdeen Edinburgh Glasgow.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
ENISA – Cloud Computing Security Strategy Dr Steve Purser Head of Technical Department European Network and Information Security Agency.
Security Controls – What Works
Deconstructing Cloud Computing
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
July 8-9, 2014 | Ronald Reagan Building | Washington, DC Federal Cloud Computing Summit Dr. Barry C. West Cloud Tools and Integration.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Chapter 3: Information Security Framework
Session 3 – Information Security Policies
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Auditing Cloud Computing: Adapting to Changes in Data Management IIA and ISACA Joint Meeting March 12, 2013 Presented by: Jay Hoffman (AEP), John Didlott.
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
MIGRATING INTO A CLOUD P. Sai Kiran. 2 Cloud Computing Definition “It is a techno-business disruptive model of using distributed large-scale data centers.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Giandonato CAGGIANO ENISA MANAGEMENT BOARD REPRESENTATIVE LEGAL ADVISER ON EUROPEAN AFFAIRS OF THE MINISTRY OF COMMUNICATIONS U. OF ROMA TRE LAW FACULTY.
Information Security Technological Security Implementation and Privacy Protection.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Information Systems Security Computer System Life Cycle Security.
Computer Science and Engineering 1 Cloud ComputingSecurity.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Kia Manoochehri.  Background  Threat Classification ◦ Traditional Threats ◦ Availability of cloud services ◦ Third-Party Control  The “Notorious Nine”
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Software Development Risk Assessment for Clouds National Technical University of Ukraine “Kiev Polytechnic Institute” Heat and energy design faculty Department.
Speaker: Meng-Ting Tsai Date:2010/11/25 The Information Assurance Practices of Cloud Computing Vendors IEEE Communications Society.
Fred Carter Senior Policy & Technology Advisor Information and Privacy Commissioner Ontario, Canada MISA Ontario Cloud Computing Transformation Workshop.
CLOUD COMPUTING-3.
PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Elizabeth Muli Technical University of Kenya & James Kimutai Moi University 1.
IS3220 Information Technology Infrastructure Security
Cloud Computing: Legislative and Regulatory Frameworks Presentation to AREGNET Ria M. Thomas 29 April 2014 Occid-OrientStrategies.
© 2011 IBM Corporation IBM Cloud Computing Data en Cloud Computing Frank van der Wal, Technical Advocate.
Draft - Enterprise Risk Management Risk Universe
Chapter 6: Securing the Cloud
Understanding The Cloud
Avenues International Inc.
Organizations Are Embracing New Opportunities
Cybersecurity - What’s Next? June 2017
Tutorials of Q.8: cloud security related works in SG17
VIRTUALIZATION & CLOUD COMPUTING
Information Security Awareness
Cloud Testing Shilpi Chugh.
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
What is Interesting in the CCSP certification?
Computer Science and Engineering
Cloud Computing for Wireless Networks
Presentation transcript:

Cloud Security Assessment

2 CoE IT Leadership.- Progress report Introduction »Cloud computing is an approach in which infrastructure and software resources are provided by an external vendor or by your internal IT department over the Internet. These resources are highly scalable and at competitive costs, which make Cloud services highly attractive in a business environment in which organisations are trying to reduce their IT capital expenditure and costs and improve the flexibility of their IT services delivery. The Cloud, a revolution on several levels…

3 CoE IT Leadership.- Progress report Reasons for using Cloud Computing Source: Flying Blind in the Cloud, Ponemon Institute, April 2010 Introduction

4 CoE IT Leadership.- Progress report Adopting Cloud computing can bring significant benefits and challenges for organisations in building trust and confidence in Cloud Computing services, including: Benefits and risks Benefits significantly lower application service costs – currently as low as $20/month for entry level web applications; dramatically reduced capital expenditure funding, with services charged for mainly by use; improved service agility, where requirements for IT services can be much more quickly met; improved productivity through cost- effective business-wide collaboration applications; and new opportunities for exploiting and sharing information, in support of business model innovation Risks concern over maintaining data privacy and security; unproven service level agreements; the difficulty of integration of existing applications and data. Introduction

5 CoE IT Leadership.- Progress report Atos Sphere Advisory Services SAP Regressio n Testing (SaaS) Product Lifecycle Mgmt.(PL M) on Demand Data Mgmt. on demand (PaaS) Atos in a box Workplace (DaaS) Infra- structure Services (IaaS) Atos Worldline (BPaaS) Introduction Atos Sphere™ Security and Compliance Opportunity Assessment Awareness Workshop Security and Compliance Business Case Pilot Project Governance Business Innovation Transition

6 CoE IT Leadership.- Progress report Cloud Services as a mix of consumer commodities and enterprise applications have to meet costumer needs for confidentiality and compliance to legal directives. This package provides: Set of core security principals to assure users and customers of a trustworthy cloud computing environment Increased level of security to support sensible enterprise applications and data in a cloud environment Customer adopted best practice rules to handle ignorance of data, processing and application location Cloud Services as a mix of consumer commodities and enterprise applications have to meet costumer needs for confidentiality and compliance to legal directives. This package provides: Set of core security principals to assure users and customers of a trustworthy cloud computing environment Increased level of security to support sensible enterprise applications and data in a cloud environment Customer adopted best practice rules to handle ignorance of data, processing and application location Introduction

7 CoE IT Leadership.- Progress report Legal Recommendations »European Commission »Data Protect Directive (Article 29) »Customer notification of data security breaches »eCommerce Directive (Article 12-15) »Minimum data protection standards and privacy certification schemes common across all stated »Country local directives »Germany: TKG, Datenschutzgesetz »Areas of attention 1.Data Security, Protection and Transfer 2.Law Enforcement Access 3.Confidentiality and non-disclosure 4.Intellectual property 5.Risk allocation and limitation of liability 6.Change of control Business issues

8 CoE IT Leadership.- Progress report Security Benefits Security and the benefits of scale »All security measures are cheaper when implemented in a large scale »Same amount of investment in security buys better protection for all kinds of defensive measures e.g. »Filtering »Patch management »Hardening of virtual machines and hypervisors »Multiple locations »Edge networks » timeliness of response to incidents, treat management »Standardized interface for managed security services (open and readily available market) »Dynamic reallocation of filtering, traffic shaping, authentication, encryption, etc. »Audit and evidence gathering (less downtime for forensic analysis, lower log storage cost) »More timely effective and efficient updates and default »Benefits of resource concentration, beside the risk security is cheaper Business issues

9 CoE IT Leadership.- Progress report Protection of sensitive information in the Cloud »Only a few organizations have taken proactive steps to protect sensitive information Source: Flying Blind in the Cloud, Ponemon Institute, April 2010 Business issues

10 CoE IT Leadership.- Progress report Security Risks Top Risks »Loss of Governance »Lock-In »Isolation Failure »Compliance Risk »Management interface compromise »Data protection »Insecure or incomplete data deletion »Malicious insider Business issues

11 CoE IT Leadership.- Progress report Security Risks by category Lock-in Loss of governance Compliance Challenges No evidence for provider compliance Provider do not permit audits Loss of business reputation due to co-tenant activities Cloud Service Termination Or Failure Cloud Provider Acquisition Supply chain failure Policy and Organizational Subpoena and e-discovery Changing jurisdiction Data protection licensing Legal Resource exhaustion (over/under provisioning Isolation failure Provider malicious insider – abuse of high privileges Management interface compromise Intercepting data in transfer Technical Data leakage on/upload intra-cloud Insecure and inefficient deletion of data Distributed denial of service attack (DDoS) Economic denial of service (EDoS) Loss of encryption keys Undertaking malicious probes and scans Compromise service engine Conflicts between customers hardening procedures Technical Network breaks Modifying network traffic Privilege escalation Social engineering attacks Loss or compromise of operation and security logs Backup lost Unauthorized access to premises Theft of Computer equipment Natural disaster Not Cloud specific Business issues

12 CoE IT Leadership.- Progress report Areas of Vulnerabilities Cloud relevant AAAUser de/provisioning Remote access to management interface Hypervisor Resource & Reputation Isolation Communication Encryption Weak encryption of archives and data transit Impossibility to process encrypted data Poor key management Key generation random number generation Lack of standard technology and solutions No source escrow agreement Inaccurate modeling of resource usage No control on vulnerability assessment process Co-Residence checks might be performed Lack of forensic readiness Sensitive media sanitization Synchronizing Responsibilities or contractual obligations external to cloud Cross cloud applications create hidden dependencies SLA Clauses with conflicting promises to different stakeholders SLA Clauses containing excessive business risk Audit or certification not available for the customer Certification schemes not adapted to cloud infrastructure Inadequate resource provisioning and investments in infrastructure No policies for resource capping (Quotas) Storage of data in multiple jurisdiction and lack of transparency Lack on information on Jurisdictions Lack of completeness and transparency in terms of use Business issues

13 CoE IT Leadership.- Progress report 7. Research Recommendations Categories »Building trust in the cloud »Effects on different forms of breach reporting on security »End-to-end data confidentiality in the cloud and beyond »Higher assurance clouds, virtual private clouds etc. »Data protection in large scale cross-organizational systems »Forensics and evidence gathering mechanisms »Incident handling, monitoring and traceability »International differences in relevant regulations including data protection and privacy »Large scale computer engineering »Resource isolation mechanisms – data, processing, logs, etc »Interoperability between cloud providers »Resilience of cloud computing How can cloud improve resilience. Business issues

14 CoE IT Leadership.- Progress report Compliance and Certifications Standards ISO (IT service management) ISO (IT security ) Sox TBC Certification methods CoBit (Control Objectives for Information and related Technology) CMMI (Capability Maturity Model Integration ) ITIL (IT infrastructure library) Business issues

15 CoE IT Leadership.- Progress report Our Approach Cloud Security services

16 CoE IT Leadership.- Progress report Customer benefits and business outcomes Customer benefits Knowledge of what your digital security weaknesses really are Knowledge of the legislative and regulatory requirements you really face Clarity on your cost v risk balance Our Approach

17 CoE IT Leadership.- Progress report fig 2 Our Approach

18 CoE IT Leadership.- Progress report Interviews Interviews with CIO/CISO/Sysadmins Document the findings using the Cloud Security Maturity Assessment Tool Vulnerability Assessment Assess the technical vulnerabilities using scanning tools Analysis Analysis of feedback Defining security controls that do not meet the required maturity level Risk modeling using the Cloud Security Assessment Tool Reporting Draft report and roadmap writing Workshop Business Risks v Costs Workshop Final Report Finalization of report and delivery of report and roadmap Our Approach