PROCURE SECURE Continuous monitoring for public sector cloud services Dr. Giles Hogben European Network and Information Security Agency.

Slides:



Advertisements
Similar presentations
European Cloud Partnership Rainer Zimmermann European Commission Information Society and Media Directorate General Head of Unit Software & Service Architectures.
Advertisements

Security, Compliance & Reliability in Cloud Services.
‘GOVCLOUD: the Queensland LG Experience’ Jock O’Keeffe Director – Resolute Information Technology.
Identity, Governance and Administration as forefront of IT Security model: European and North American Experience Vladislav Shapiro Director of Identity.
The French approach to CIIP ENISA workshop. Coordination of CIP in France ANSSI 2 A cross-ministerial issue The General Secretariat for Defense and National.
1 Market Oversight Sally Warren Andrea Sutcliffe Ray James 30 October 2014 NCAS.
Copyright © 2011 Cloud Security Alliance.
04b | Manage Test Execution (2 of 2) Steven Borg | Co-founder & Strategist, Northwest Cadence Anthony Borton | ALM Consultant, Enhance ALM.
Managing A Secure Infrastructure – Tales From the Trenches November 6, 2003.
Date: 03/05/2007 Vendor Management and Metrics. 2 A.T. Kearney X/mm.yyyy/00000 AT Kearney’s IT/Telecom Vendor Facts IT/Telecom service, software and equipment.
Can Government policies improve local public services? An assessment of the impacts of top-down reform strategies Dr James Downe Cardiff Business School.
(Geneva, Switzerland, September 2014)
Meeting the Challenges of the Care Act Virginia McCririck for the RCPA Conference on 26 th November 2014.
ENISA and Cloud Security
Business Services in Europe: Raising the Game Norman Rose Vice-Chairman High Level Group on Business Services & Chairman European Business Services Round.
OneCard - a single, transferable membership for London’s libraries Mike Clarke Director, London Libraries Development Agency SmartCard Networking Forum.
JANUARY 08, 2010 Cerf urges standards for cloud computing Management of cloud assets requires protocols, standards, and research, Internet.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
UCC Research Cloud Brian Clayton Boole Centre for Research in Informatics.
Copyright 2013 FUJITSU LIMITED. AGENDA Mitigation Considerations 4. Data Security – Examples and Application 2. Data Security Life-Cycle 1 1. Data Management.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
 Jonathan Trull, Deputy State Auditor, Colorado Office of the State Auditor  Travis Schack, Colorado’s Information Security Officer  Chris Ingram,
EPM Live – Positioning for Enterprise Project Management Presented by: Sasha Lomas, PMP ASL InfoTech inc. March 3, 2010.
Public-Private Partnerships in Action: Emergency Response
National Investment in Water and Waste Water Infrastructure, Funding & Pricing Mid-West Regional Authority Annual Conference 2009.
Administration and Finance Incident Prioritization Document
© 2014 The MITRE Corporation. All rights reserved. Greg Nelson June 23, 2014 Aviation Safety Information Analysis and Sharing (ASIAS) Overview.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Welcome and Introductions Shulah Allan. Integration update Peter Gabbitas.
European Grid Initiative Technical Forum 21 September 2011, Lyon The Digital Agenda for Europe What about the Cloud? Carl-Christian Buhr European Commission.
BS2912 Public Administration in Britain 6 : Modernising Government- Quality issues.
Cloud services security Prof. Manel Medina Head of Unit CERT Operations support ENISA
Sussex Energy Group SPRU - Science and Technology Policy Research Climate change mitigation and transforming the UK energy system Jim Watson Director,
Roles and Responsibilities
Final year undergraduate student? Make sure you do the National Student Survey (NSS)
Working Together To Protect Public Health: The Public Health Communications Infrastructure May 23, 2006 Janet B. Stevens Director, Management Controls.
NOT PROTECTIVELY MARKED Bill Lyons Head of Resilience Scottish Environment Protection Agency.
Close to Home An inquiry into older people and human rights in home care.
Mark Richardson VCSE Specialist Adviser Views and roles of VCSE in devolution.
Registering the care sector – next steps Dr Linda Hutchinson Director, Care Quality Commission National Care Association Conference, 21 October 2010.
Healthcare Commission update Sue Fraser-Betts Senior Assessment Manager October
Pre-Commercial Procurement (PCP) Actions Open call in Objective 11.1 Calls for PCPs in specific public sector domains in objectives 5.3, 5.4 and 3.5
The 2012 European Cloud Computing Conference Brussels, 21 March 2012 Building the European Cloud Computing Strategy Carl-Christian Buhr (All expressed.
Malta Council for Science and Technology Practicalities Health and Food, Agriculture, Fisheries & Biotechnology – Information Session 25 th September 2008.
European Union Agency for Network and Information Security ENISA and Cloud Security Dimitra Liveri| NIS Expert EuroCloud Forum 2015| Barcelona|
Software Development Risk Assessment for Clouds National Technical University of Ukraine “Kiev Polytechnic Institute” Heat and energy design faculty Department.
Geneva, Switzerland, 14 November 2014 ENISA and Cloud Certification Dimitra Liveri Security and Resilience of Communication Networks Officer ENISA ITU.
Strengthening the commitment
Robert Mahowald August 26, 2015 VP, Cloud Software, IDC
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
Ray James President Personalised, coordinated care supported by technology in 2025 What would it look like?
How to avoid a warning notice 4 December 2012 Jennifer Pattinson Compliance Manager.
Possibilities for joint procurement of commercial cloud services for WLCG WLCG Overview Board Bob Jones (CERN) 28 November 2014.
Minimising IT costs, maximising operational efficiency IO and NIMM: Now is the time Glyn Knaresborough Director of Strategic Consulting.
TÜBİTAK – BİLGEM – SGE Cyber Security Institute
TÜBİTAK – BİLGEM – SGE Cyber Security Institute Asım Gençer Gökce TÜBİTAK BİLGEM Cyber Security Institute (SGE) Role: Cyber.
Botnets: Measurement, Detection, Disinfection and Defence Dr Giles Hogben ENISA.
1 Home Care Support Outcome Based Specification Workshop 26 th November 2009.
Reforming the State System for the provision of social services, setting the vision, aims and objectives: The United Kingdom Experience Mr Sean Holland.
RESOURCES AND CORPORATE DEVELOPMENT SCRUTINY COMMITTEE Tuesday 17 th June 2003 RESOURCES DIRECTORATE Julie Alderson Executive Director Resources.
Department of Computer Science Introduction to Information Security Chapter 8 ISO/IEC Semester 1.
‘GOVCLOUD: the Queensland LG Experience’
Raising standards, putting people first
SaaS Application Deep Dive
Building A Community of Trust to Transform Medicines Development
The European Anti-Corruption Report
The European Union response to cyber threats
Community of Users.
Pharmaceutical Industry Feedback HPRA Performance
7/28/ :33 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or.
Presentation transcript:

PROCURE SECURE Continuous monitoring for public sector cloud services Dr. Giles Hogben European Network and Information Security Agency

2

3

Continuous monitoring The proof of the pudding is in the eating

What is continuous monitoring? – Real-time service level data/feeds, including service level dashboards. – Regular service level reports. – Incident reports and alerts raised by the cloud provider. – APIs

ENISA SURVEY ON CONTINUOUS MONITORING IN THE PUBLIC SECTOR

Survey and analysis of security parameters in cloud SLAs across the European public sector 117 fully completed responses from IT officers across the European public sector 15 different EU countries 77% of respondents said they have high or very high security requirements (41% and 36%) 70 respondents agreed to be part of the focus group.

10 Penetration tests

11 Backup/failover tests

12 Data portability tests

MAIN REPORT

Who contributed? Paolo Balboni, ICT Legal Consulting, Tilburg University, European Privacy Association Art Barnes, Dell Secureworks Matt Broda, Oneforo Corporation James Bryce Clark, OASIS Daniele Catteddu, Cloud Security Alliance George Chetcuti, Government of Malta Nick Coleman, IBM Dr. Peter Dickman, Google Dr. Niels Fallenbeck, Fraunhofer AISEC Julia Herman, European Aviation Safety Agency Brian Honan, BH Consulting Jens Jensen, Science and Technology Facilities Council, UK, Funded by EU Contrail Project Ben Katsumi, IPA, Japan Kieran McCorry, Hewlett Packard Mark Penny, UK Department of Health Informatics Directorate David Pollington, Microsoft James Reynolds, Left Coast Logic Dobromir Todorov, Amazon Web Services Dr. Nicolas Vanderavero, Federal Public Service Finance, Belgium Beau Woods, Dell Secureworks

The parameters 1.Service availability 2.Incident response 3.Service elasticity and load tolerance 4.Data life-cycle management 5.Vulnerability management 6.Change management 7.Data isolation 8.Log management and forensics

Parameter breakdown What to measure Should I care about it How to measure it Independent testing When to raise the flag/thresholds Customer responsibilities

Drill-down Service availability Incident response Service elasticity and load tolerance

Availability What to measure? Scope: How many users? Scope: What service functions? Define failure: When is a user “available” Commitment period: Can I have all my unavailability in one go? Does it matter more at weekends/nights Scheduled unavailability Do I care – E.g. Scheduled unavailability at weekends – Large transactions and MTBF

Availability How to measure it – User reports – Logs: Examination of logs by the provider, to detect errors. – Sample requests/service health-check. Independent testing – Polling, user feedback (make sure you don’t trigger DDoS protection, or CAPTCHAs).

Availability When to raise the flag/thresholds – How realtime is your service – e.g. financial services would set much lower thresholds for availability incidents. Customer responsibilities – Understand dependencies – For systems under your control (e.g. IaaS servers) Design for failure where you can Test and monitor.

Examples

Incident Management What to measure What is a severe incident How many severe incidents have occurred and how quickly did the provider respond? What % of sev x incidents are resolved within time y. Does the provider keep you up to date? How quickly do they detect (where there’s an independent measure). How to measure Incident classification scheme

Incident management Independent testing – Independent logs of response times – Independent detection can tell you about detection times (or failure to detect) Customer responsibilities – Make sure you’re not causing an incident – Agree on classification scheme – Provide any customer-side resources required to resolve an incident

Example

Elasticity and load tolerance What to measure – Ratio of failed resource provisioning requests to total number of resource provisioning requests Should I care – Load volatility – DDoS risk How to measure – Burst testing – Real-time monitoring or log inspection of resource provisioning

Elasticity and Load Tolerance Independent testing – Depends on overall demand -> independent testing is often meaningless – Test reserved capacity limits and provisioning speed

Examples

Howard Schmidt, Whitehouse Cyber-Security Coordinator Continuous Monitoring of Federal Information Systems “Transforms the otherwise static security control assessment … into a dynamic risk mitigation program that provides.. near real- time security status and remediation”

Neelie Kroes, Davos, Switzerland, 26th January 2012 “Today I am inviting public authorities and industry, Cloud buyers and suppliers, to come together in a European Cloud Partnership. In the first phase, the Partnership will come up with common requirements for Cloud procurement. For this it will look at standards; it will look at security;” Commission has proposed to allocate 10 million Euro in funding for common procurement requirements in 2013

Procure Secure – Continuous Monitoring Anyone procuring IT systems Focus on cloud, public sector but widely applicable. If you are busy- use the checklist format Survey: Guide:

?