Cloud Security Challenges Today and Tomorrow NameTitle February 2011.

Slides:



Advertisements
Similar presentations
© 2012 Open Grid Forum Simplifying Inter-Clouds October 10, 2012 Hyatt Regency Hotel Chicago, Illinois, USA.
Advertisements

Impacts of 3 rd Party IaaS on broadband network operations and businesses Prabhat Kumar Managing Partner, i 3 m 3 Solutions.
Copyright © 2011 Cloud Security Alliance DANIELE CATTEDDU CSA Managing Director EMEA.
Copyright © 2011 Cloud Security Alliance Achieving Security Assurance and Compliance in the Cloud Jim Reavis, Executive Director.
Cloud Security Alliance Research & Roadmap June 2012
Copyright © 2011 Cloud Security Alliance Trusted Cloud Initiative Work Group Session.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
AFM INTERNAL AUDIT NETWORK MEETING MUTUAL ONE GROVE PARK, LEICESTER Current ‘Hot Topics’ in Information Security Governance Auditing David Tattersall 03.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Copyright © 2014 Cloud Security Alliance Security Certification for Cloud Services : The CSA STAR Certification Daniele Catteddu,
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Copyright © 2011 Cloud Security Alliance Keynote.
Copyright © 2012 Cloud Security Alliance Conference Announcements.
Security in the Cloud: Can You Trust What You Can’t Touch? Rob Johnson Security Architect, Cloud Engineering Unisys Corp.
Achieving Assurance and Compliance in the Cloud Digital Government Cyber Security Conference Cheryl Wilner, CEO Bethesda Advanced Solutions Ronald Regan.
Copyright © 2012 Cloud Security Alliance – UK & Ireland Liberty Hall, Dublin March 30th 2012.
Security Controls – What Works
Cloud Computing – Risk and Rewards Mark Salamasick Director of Center for Internal Auditing For Austin Chapter of the IIA April 14, 2015.
The Information Systems Audit Process
Managing the Information Technology Resource Course Introduction.
Oyinkan Adedun Adeleye Caitlyn Carney Tyler Nguyen.
Achieving Security Assurance and Compliance in the Cloud Jim Reavis Executive Director.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Introduction to the Microsoft Private Cloud WSV207 Symon Perriman Technical Evangelist Microsoft WSV207.
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
Cloud Computing in Large Scale Projects George Bourmas Sales Consulting Manager Database & Options.
1 © 2009 Cisco Systems, Inc. All rights reserved.Cisco PublicC Cloud Computing: What’s on the Horizon Daniel Bogda Channel SE.
Cloud Security Alliance
MIGRATING INTO A CLOUD P. Sai Kiran. 2 Cloud Computing Definition “It is a techno-business disruptive model of using distributed large-scale data centers.
Cloud Enabled Healthcare Presented by: Ron Parker and Stanley Ratajczak Emerging Technology Group Canada Health Infoway Inc. May 28, 2013Copyright © 2013.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Cloud Security Challenges Today and Tomorrow Aloysius Cheang Asia Pacific Strategy Advisor April 2011.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
Jim Reavis, Executive Director Cloud Security Alliance November 22, 2010 Developing a Baseline On Cloud Security.
Cloud Security Alliance Research & Roadmap Jim Reavis Executive Director August 2011.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
© Cloud Security Alliance, 2015 Sean Cordero, Chair CCM Laura Posey, Chair CAIQ.
Dell Connected Security Solutions Simplify & unify.
Computer Science and Engineering 1 Cloud ComputingSecurity.
Achieving Security Assurance and Compliance in the Cloud Jim Reavis Executive Director.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Cloud Security Alliance Research & Roadmap
Challenges in Infosecurity Practices at IT Organizations
Cloud Security Alliance Overview and Organizational Plans Jim Reavis, Co-founder & Executive Director August 5, 2009.
Copyright © 2011 Cloud Security Alliance Building Trust into the Next Generation of Information Technology.
© 2011 IBM Corporation 1 (ENSUREing we can) Ride the Wave (on a Cloud) Presenter: Michael Factor, Ph.D. IBM Research – Haifa
Copyright © 2011 Cloud Security Alliance Cloud Security Alliance Research & Roadmap Jim Reavis, Executive Director, CSA.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Cloud Security: Critical Threats and Global Initiatives Jim Reavis, Executive Director July, 2010.
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Cloud Architecture. SPI Model Cloud Computing Classification Model – SPI Cloud Computing Classification Model – SPI - SaaS: (Software as a Service) -
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
© Cloud Security Alliance, 2015 March 2, Agenda © Cloud Security Alliance, 2015 The SecaaS Working Group Recent Activity Charter Category outline/templates.
Cloud, big data, and mobility Your phone today probably meets the minimum requirements to run Windows Server 2003 Transformational change up.
© 2011 IBM Corporation IBM Cloud Computing Data en Cloud Computing Frank van der Wal, Technical Advocate.
Chapter 6: Securing the Cloud
Understanding The Cloud
Current ‘Hot Topics’ in Information Security Governance Auditing
Developing a Baseline On Cloud Security Jim Reavis, Executive Director
Achieving Security Assurance and Compliance in the Cloud
What is Interesting in the CCSP certification?
Computer Science and Engineering
National Information Assurance (NIA) Policy
IT Management Services Infrastructure Services
Presentation transcript:

Cloud Security Challenges Today and Tomorrow NameTitle February 2011

Copyright © 2011 Cloud Security Alliance Cloud: Dawn of a New Age Cloud – overhyped in the short run, underestimated in the long term Compute becoming a utility Changes everything: business models, venture capital, R&D, ……

Copyright © 2011 Cloud Security Alliance What is Cloud Computing? Compute as a utility: third major era of computing Cloud enabled by Moore’s Law Hyperconnectivity SOA Provider scale Key characteristics Elastic & on-demand Multi-tenancy Metered service

Copyright © 2011 Cloud Security Alliance : the Hybrid Enterprise enterprise boundary public clouds Extended Virtual Data Center private clouds cloud of users Notional organizational boundary Dispersal of applications Dispersal of data Dispersal of users Dispersal of endpoint devices

Copyright © 2011 Cloud Security Alliance Cloud Forcing Key Issues Critical mass of separation between data owners and data processors Anonymity of geography of data centers & devices Anonymity of provider Transient provider relationships Physical controls must be replaced by virtual controls Identity management has a key role to play Cloud WILL drive change in the security status quo Reset button for security ecosystem

Copyright © 2011 Cloud Security Alliance Key Cloud Security Problems of Today From CSA Top Threats Research: Trust: Lack of Provider transparency, impacts Governance, Risk Management, Compliance Data: Leakage, Loss or Storage in unfriendly geography Insecure Cloud software Malicious use of Cloud services Account/Service Hijacking Malicious Insiders Cloud-specific attacks

Copyright © 2011 Cloud Security Alliance Key Problems of Tomorrow Globally incompatible legislation and policy Non-standard Private & Public clouds Lack of continuous Risk Mgt & Compliance monitoring Incomplete Identity Mgt implementations Haphazard response to security incidents

Copyright © 2011 Cloud Security Alliance About the Cloud Security Alliance Global, not-for-profit organization Over 17,000 individual members, 90 corporate members Building best practices and a trusted cloud ecosystem Agile philosophy, rapid development of applied research GRC: Balance compliance with risk management Reference models: build using existing standards Identity: a key foundation of a functioning cloud economy Champion interoperability Advocacy of prudent public policy “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.”

Copyright © 2011 Cloud Security Alliance Helpful research from CSA

Copyright © 2011 Cloud Security Alliance CSA Guidance Research Guidance > 100k downloads: cloudsecurityalliance.org/guidancecloudsecurityalliance.org/guidance Governance and Enterprise Risk Management Legal and Electronic Discovery Compliance and Audit Information Lifecycle Management Portability and Interoperability Security, Bus. Cont,, and Disaster Recovery Data Center Operations Incident Response, Notification, Remediation Application Security Encryption and Key Management Identity and Access Management Virtualization Cloud Architecture Operating in the Cloud Governing the Cloud Popular best practices for securing cloud computing Popular best practices for securing cloud computing V2.1 released 12/2009 V2.1 released 12/2009 V3 target Q V3 target Q wiki.cloudsecurityalliance.org/guidance wiki.cloudsecurityalliance.org/guidance

Copyright © 2011 Cloud Security Alliance Sample Guidance - Governance Best opportunity to secure cloud engagement is before procurement – contracts, SLAs, architecture Know provider’s third parties, BCM/DR, financial viability, employee vetting Identify data location when possible Plan for provider termination & return of assets Preserve right to audit where possible Reinvest provider cost savings into due diligence

Copyright © 2011 Cloud Security Alliance Sample Guidance - Operating Encrypt data when possible, segregate key mgt from cloud provider Adapt secure software development lifecycle Understand provider’s patching, provisioning, protection Logging, data exfiltration, granular customer segregation Hardened VM images Assess provider IdM integration, e.g. SAML, OpenID

Copyright © 2011 Cloud Security Alliance Cloud Controls Matrix Tool Controls derived from guidance Rated as applicable to S-P-I Customer vs Provider role Mapped to ISO 27001, COBIT, PCI, HIPAA Help bridge the “cloud gap” for IT & IT auditors

Copyright © 2011 Cloud Security Alliance Consensus Assessment Initiative Research tools and processes to perform shared assessments of cloud providers Lightweight “common criteria” concept Integrated with Controls Matrix Ver 1 CAI Questionnaire released Oct 2010, approx 140 provider questions to identify presence of security controls or practices – use to assess cloud providers today

Copyright © 2011 Cloud Security Alliance CloudAudit Open standard and API to automate provider audit assertions Change audit from data gathering to data analysis Necessary to provide audit & assurance at the scale demanded by cloud providers Uses Cloud Controls Matrix as controls namespace Use to instrument cloud for continuous controls monitoring

Copyright © 2011 Cloud Security Alliance CSA GRC Stack Suite of tools, best practices and enabling technology Consolidate industry research & simplify GRC in the cloud For cloud providers, enterprises, solution providers and audit/compliance Controls Framework, Questionnaire and Continuous Controls Monitoring Automation Control Requirements Provider Assertions Private & Public Clouds

Copyright © 2011 Cloud Security Alliance CCSK – Certificate of Cloud Security Knowledge Only user certification for cloud security Web-based test for competency in CSA guidance $295 USD price Training courses under development

Copyright © 2011 Cloud Security Alliance Trusted Cloud Initiative Comprehensive Cloud Security Reference Architecture Secure & interoperable Identity in the cloud Getting SaaS, PaaS to be “Relying Parties” for corporate directories Scalable federation Outline responsibilities for Identity Providers Assemble reference architectures with existing standards Identity Mgt best practices whitepaper:

Copyright © 2011 Cloud Security Alliance The need for the Security as a Service Initiative Information assurance challenged by disruptive trends (cloud, mobility, social networking, etc) Cloud provides opportunity to rethink security (economics, architecture, service delivery models, etc) Fulfill 2 nd half of mission statement: “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.”

Copyright © 2011 Cloud Security Alliance Security as a Service Scope Information Security Industry Re-invented Define Security as a Service Articulate solution categories within Security as a Service Guidance for adoption of Security as a Service Align with other CSA research Develop deliverables as a proposed 14 th domain within CSA Guidance version 3.

Copyright © 2011 Cloud Security Alliance CloudSIRT Consensus research for emergency response in Cloud Enhance community’s ability to respond to incidents Standardized processes Supplemental best practices for SIRTs Hosted Community of Cloud SIRTs

Copyright © 2011 Cloud Security Alliance Contact Help us secure cloud computing LinkedIn:

Thank you!