Cloud Computing NSAA Tallahassee September 2010 Brian Rue

Slides:



Advertisements
Similar presentations
Clouds: What’s new is old is new… Joseph Alhadeff, VP Global Public Policy; CPO, Oracle.
Advertisements

Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate. Presented by: Sabrina M. Segal, USITC, Counselor to the.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
1 Presented By: David Kidd, Director of Compliance, Peak 10 & Brian Herman, VP of Managed Security Sales, Still Secure.
Clouds C. Vuerli Contributed by Zsolt Nemeth. As it started.
Security in the Cloud: Can You Trust What You Can’t Touch? Rob Johnson Security Architect, Cloud Engineering Unisys Corp.
Introduction to Cloud Computing and Secure Cloud Computing
The Cloud: Demystified Neil Cattermull Frontier Technology.
Cloud Computing Will Crowley Monica Lopez Jaimie Morrison.
Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security,
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Wally Kowal, President and Founder Canadian Cloud Computing Inc.
SaaS, PaaS & TaaS By: Raza Usmani
Be Smart, Use PwrSmart What Is The Cloud?. Where Did The Cloud Come From? We get the term “Cloud” from the early days of the internet where we drew a.
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
SPRING 2011 CLOUD COMPUTING Cloud Computing San José State University Computer Architecture (CS 147) Professor Sin-Min Lee Presentation by Vladimir Serdyukov.
Design of New or Changed Services in the Cloud: An ISO/IEC Perspective Ronald Dattero Missouri State University, CIS Dept. Stuart D. Galup Florida.
Oyinkan Adedun Adeleye Caitlyn Carney Tyler Nguyen.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Discussion on LI for Mobile Clouds
Travis, Stephanie, Alex.  Cloud computing is a general term for anything that involves delivering hosted services over the Internet.  These services.
Plan Introduction What is Cloud Computing?
NARA’s FAQ and Bulletin on Managing Federal Records in Cloud Computing Environments Arian D. Ravanbakhsh Electronic Records Policy Specialist RACO Chicago.
Introduction to Cloud Computing
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Cloud Computing Cloud Computing Class-1. Introduction to Cloud Computing In cloud computing, the word cloud (also phrased as "the cloud") is used as a.
Celoxis Intro Celoxis is a web-based project management software company based in India. The Celoxis application integrates management of projects, resources,
Osama Shahid ( ) Vishal ( ) BSCS-5B
Jim Reavis, Executive Director Cloud Security Alliance November 22, 2010 Developing a Baseline On Cloud Security.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
Lecture 6: Cloud Computing By D. Najla Al-Nabhan 1.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
Computer Science and Engineering 1 Cloud ComputingSecurity.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
Cloud Computing: The Basics, Benefits and Risks Image:
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
1 NETE4631 Course Wrap-up and Benefits, Challenges, Risks Lecture Notes #15.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
LEGAL ISSUES IN CLOUD COMPUTING
Cloud Computing. Definition  The Cloud is a metaphor for the Internet  Cloud computing is a model for enabling ubiquitous, convenient, on-demand network.
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Bellevue College Cloud Meetup Explore Cloud services Tuesday, February 9, 2016.
G-Cloud - The Delivery of a Shared Computing Platform for Government Ian Osborne Director, Digital Systems KTN Intellect.
ISA 201 Intermediate Information Systems Acquisition.
By: Joshua Wiegand. Overview ● What is the cloud computing? ● History of Mobile Computing ● Service Models ● Deployment Models ● Architecture ● Security.
INTRODUCTION TO CLOUD COMPUTING. CLOUD  The expression cloud is commonly used in science to describe a large agglomeration of objects that visually appear.
Private KEEP OFF! Private KEEP OFF! Open! What is a cloud? Cloud computing is a model for enabling convenient, on-demand network access to a shared.
GIS IN THE CLOUD Cloud computing furnishes scalable GIS technology that is maintained off premises and delivered on demand as services via the Internet.
The National Institute of Standards and Technology (NIST) define Cloud Computing as “a model for enabling convenient, on-demand network access to a shared.
Clouding with Microsoft Azure
Lecture 6: Cloud Computing
Chapter 6: Securing the Cloud
Avenues International Inc.
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
Platform as a Service (PaaS)
VIRTUALIZATION & CLOUD COMPUTING
Hot Topics:Mobility in the Cloud
Paul Woods Chair, MITIGATION: Ensuring we procure cloud services taking into account of the risks involved Paul Woods Chair, ISNorthEast.
CNIT131 Internet Basics & Beginning HTML
Clouds: What’s new is old is new…
Developing a Baseline On Cloud Security Jim Reavis, Executive Director
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
Computer Science and Engineering
Basics of Cloud Computing
Cloud Computing for Wireless Networks
Presentation transcript:

Cloud Computing NSAA Tallahassee September 2010 Brian Rue

Agenda 1)Cloud Audit Drivers 2)Cloud Deployment (SaaS, PaaS, IaaS) 3)Cloud Delivery Methods (Private, Community, Public, Hybrid) 4)Cloud Communications 5)Data/Application Data Center Geography 6)Select Cloud Legal Issues 7)Select Data Security Issues 8)Cloud Contract Review 9)Cloud Audit Program Resources 10)Cloud Resources 2

* Back to the Future* - Centralized Computing Architecture, Application Service Providers, and Thin Client Computing Architectures 3

Why State Entities Cloud - Potential to Reduce Costs Cloud technology can result in cost savings over in-house solutions. Promotes Automation Can shift (variable by cloud type) backend hardware and software support to cloud vendor reducing required staff at the client site. On-Demand Scalable architecture allows client to dial-up and dial-down computing resources to match work flows. Mobility Web User Interface allows clients to connect from any computing device using a supported Web browser. Shift IT Security Controls Client can contractually shift IT security controls to the vendor depending on the type of cloud architecture. Frees IT to Innovate Clients have less support issues to worry about allowing IT to concentrate on innovation. 4

5 1. Cloud Audit Drivers

Audit Reports 6

Evolving Government Guidance Legislative Interest 7

Outsourcing Compliance Mandated Reviews Evolving Cloud Security Controls 8

State Cloud Issues State Cloud Migration 9

Getting Confortable in the Cloud Environment 10

2. Three Cloud Deployment Methods 11

1. Software as a Service (SaaS) Vendor runs/owns: – Application Software – Platform (Operating System/Web apps/middleware/database) – Supporting Infrastructure (data center) The applications are accessible from various client devices through a thin client interface such as a web browser. 12

SAS Video 13

14 Example SaaS Product --Google Apps

2. Platform as a Service (PaaS) Vendor runs/owns: – Platform (Operating System/Web apps/middleware/database) – Supporting Infrastructure (data center) Client does not manage underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. 15

PaaS Video 16

3. Infrastructure as a Service (IaaS) Vendor runs/owns: – Supporting Infrastructure (data center) The client does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls). 17

IaaS Video 18

19 NIST Chart

20 Cloud Providers

3. Cloud Delivery Methods 21

1. Private Clouds The Private Cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise. 22

1.1 Private Clouds 23

2. Community Clouds The Community cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on premise or off premise. 24

2.1 Community Clouds Video 25

3. Public Clouds The Public Cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. 26

3.1 Public Clouds 27

4. Hybrid Clouds The Hybrid Cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds). 28

4.1 Hybrid Cloud Video 29

30 NIST Cloud Delivery Chart

4. Cloud Communications Mapping the data flows between auditee, the cloud service, and any outside customers 31

Understanding the Pipes Internet Secure 100 Mbps or Gigabit private networks Virtual Private Networks (VPNs) Dedicated Lines SSL/SSH Wireless Carriers (Wi-Fi/WiMax/LTE/3G) Home Networks Public Access Points Multinational 32

Security of the Pipes-A Cloud Security Concern (Does a Plan B Exist?) Service Disruptions – From entity ISP Internet connectivity to Denial of service attacks against Internet/Vendor infrastructure 33

Encrypted Communications Encrypted Cloud Contacts – Strength – Key Management Vendor Retains Encryption Keys Entity Retains Keys 34

Data Packet 54 Where are You ? 5. Data Center Geography 35

Cloud Vendors Maintain Data Centers in Multiple Locations Across the Globe 36

Location, Location, Location 37 Cloud vendors can have the ability to port client data and application processing across borders absent contractual geographical restrictions.

One prominent SaaS provider has been identified as not being able to state, definitively, where one's data is hosted or that its location will be restricted to any given region. 38

39

More Secrecy from Vendors According to Network World, “Cloud service providers often cultivate an aura of secrecy about data centers and operations, claiming this stance improves their security even if it leaves everyone else in the dark”; these providers often believe that such secrecy is an integral part of the cloud-computing business model. 40

6. Select Legal Issues 41

IMPORTANT: Cloud Vendors do not always know if entity is using cloud resources to store and/or process data that is protected by State, Federal, or Contractual Obligations…. 42

HIPAA/HITECH – Note requirements concerning the terms between audited entity and the business associate contract (BAC) which HIPAA/HITECH requires these parties to have. HITECH does create security obligations for Business Associates (BAs) with responsibility for joint IT environments. Additional issues concern BAs ability to monitor entity’s environment to ensure any privacy/security issues are promptly communicated to contracted entity. PCI DSS – Cloud use for credit card processing must include cloud contract provisions concerning the cloud vendors duties as a Service Provider under PCI DSS including the vendors obligation to maintain a compliant cloud environment. State Privacy Laws – Contracted cloud provisions should match the appropriate state security or privacy laws. Business Associates – State Laws – Service Providers 43

e-Discovery in the Cloud cloud provider possession and custody but delegation of control to a customer Has the auditee developed e-discovery procedures including getting information off the cloud when a request is made? Has the auditee reviewed and validated controls used to of protect the cloud documents to counter potential legal challenges? – How does the entity ensure documents are not moved to geographical locations that may put e- document integrity at risk? 44

Subpoenas State or Federal Subpoenas could be issued against data/logs held by the cloud vendor – Subpoena procedures may result in customer data/logs being reviewed even if customer data is not part of subpoena due to multi-tenant cloud architecture if data is not encrypted and key held by client. There may be not judicial oversight requiring the cloud vendor to alert the client of the subpoena activity involving client data or network logs 45

7. Cloud Data Security Issues 46

Security Issues Vendor connections to entity data security systems – Vendor may have access to local authentication and authorization assets maintained by client (i.e. Active Directory) through hosted apps and databases Lack of client audit clauses Data encryption keys controlled by cloud vendor not entity Lack of vendor logs (Application/Database/Network) or limited access logs to vendor logs Slack vendor change management/patching procedures Unclear vendor incident response procedures (timely alerts?) Loss of physical control of data assets – Controlling movement of data assets geographically – Increased security issues in virtual environments 47

Top Cloud Client Security Fails 0.0% development of client risk assessment to understand and develop appropriate control and monitoring procedures to ensure CIA in the cloud and end-points Client gives up ownership or responsibility or governance of what's going on with their data to cloud service providers 48

Contracted Security Cloud vendors will construct security clauses in client contracts that best protect the legal interest of the vendor and not necessarily the client: – Vendor may not define security standards they will follow to protect client assets – Vendor may not define procedures for the timely application of security patches to purchased infrastructure – Most vendors contractually prohibit client vulnerability and PII scans of purchased cloud environment – Not specify what privacy or data security laws they must comply with. 49

SAS 70 - ISO/IEC – SSAE No. 16 The Vendor Entity Contracting Guidelines or Procedures 50 SSAE No. 16

8. Cloud Contract Review 51

It’s All About the Contracts The majority of your program audit hours will be allocated to cloud contract review 52

9. Developing a Cloud Audit Program 53

54 ISACA – Cloud Computing Management Audit/Assurance Program

55

56

10. Cloud Auditing Resources 57

58 GSA Cloud Guidance

59 Cloud Federal Privacy Recommendations

60 CSA Cloud Security Guidance

61 NIST Cloud Presentations

62 Questions