Will Your Cloud Be Compliant? Scott Carlson – PayPal Evgeniya Shumakher - Mirantis.

Slides:



Advertisements
Similar presentations
Driving Factors Security Risk Mgt Controls Compliance.
Advertisements

Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
CONFIDENTIAL Copyright © 2010 Constant Contact, Inc. 1.
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
E-Business Technologies Changzhe Yin 2010/12/17. Contents  Introduction  Concept  Process  Business Usage  Conclusion.
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
PMS /134/182 HEX 0886B6 PMS /39/80 HEX 5E2750 PMS /168/180 HEX 00A8B4 PMS /190/40 HEX 66CC33 Commission Payment Process.
Jeff Williams Information Security Officer CSU, Sacramento
Security Controls – What Works
1 DCS860A Emerging Technology Physical layer transparency in Cloud Computing (rev )
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
GPUG ® Summit 2011 November 8-11 Caesars Palace – Las Vegas, NV Payment Processing Online and Within Dynamics GP PCI Compliance and Secure Payment Processing.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Notes: Update as of 12/31/2010 inclusive. Chart counts NIST CVE – Reported Software Flaws by “published” date, utilizing the NIST NVD. SQL Server.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Why Comply with PCI Security Standards?
Introduction to PCI DSS
Payment Card Industry (PCI) Data Security Standard
Installing and Configuring a Secure Web Server COEN 351 David Papay.
Payment Card Industry Data Security Standard (PCI DSS) By Roni Argetsinger
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
The Right Choice for Call Recording OAISYS and PCI DSS Compliance Managing Payment Card Industry Compliance with OAISYS Call Recording Solutions.
The influence of PCI upon retail payment design and architectures Ian White QSA Head of UK&I and ME PCI Team September 4, 2013 Weekend Conference 7 & 8.
An Introduction to PCI Compliance. Data Breach Trends About PCI-SSC 12 Requirements of PCI-DSS Establishing Your Validation Level PCI Basics Benefits.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
The Payment Card Industry (PCI) Data Security Standard: What it is and why you might find it useful Fred Hopper, CISSP TASK - 27 March 2007.
PCI requirements in business language What can happen with the cardholder data?
PCI: As complicated as it sounds? Gerry Lawrence CTO
Credit Card Processing Gail “Montreal” Shoffey Keeler August 14, 2007.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
Introduction to Payment Card Industry Data Security Standard
C4Home Paid Services PayPal 1.Cross-broader Transaction Fee: 3.9% + ~ $10NTD each 2.Transaction Fees (USD to NTD): 4% 3.Buffer: 2% Total: Paypal takes.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
1 Suronapee Phoomvuthisarn, Ph.D. / NETE4631:Cloud Privacy and Security - Lecture 12.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Information Security 2013 Roadshow - PCI. Roadshow Outline  What IS PCI  Why we Care about PCI  What PCI Means to You and Me.
PCI Training for PointOS Resellers PointOS Updated September 28, 2010.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Alliance Key Manager for Windows Azure Puts Encryption Key Management and Data Breach Security at Your Fingertips COMPANY PROFILE: TOWNSEND SECURITY Townsend.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Standards in Use. EMV June 16Caribbean Electronic Payments LLC2.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
© 2014 PayPal Inc. All rights reserved. Confidential and proprietary. Can Security and Agility Co-Exist? Arizona Technology Summit 2014 Scott Carlson –
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Clouding with Microsoft Azure
Introduction to PCI DSS
Payment Card Industry (PCI) Rules and Standards
Performing Risk Analysis and Testing: Outsource or In-house
Chapter 6: Securing the Cloud
PCI-DSS Security Awareness
Understanding The Cloud
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment card industry data security standards
Internet Payment.
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Data Security for Microsoft Azure
Contact Center Security Strategies
IT Management Services Infrastructure Services
Presentation transcript:

Will Your Cloud Be Compliant? Scott Carlson – PayPal Evgeniya Shumakher - Mirantis

© MIRANTIS 2013 OpenStack Cloud Compliance Evgeniya Shumakher Business Analyst

What is ‘Compliance’? Compliance means conforming to a rule, such as a specification, policy, standard or law. Regulatory compliance describes the goal that organisations aspire to achieve in their efforts to ensure that they are aware of and take steps to comply with relevant laws and regulations.

Compliance <> Security SecurityCompliance

It’s all about information ConfidentialityIntegrityAvailability Example: The Payment Card Industry Data Security Standard (PCI DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent data security measures globally.

Enterprise ecosystem DataApplicationsOperating SystemsOpenStackProcessing and Memory, Data Storage, NetworkPhysical facilities People Business Processes Regulations

Who is responsible? CloudStackIaaSPaaSSaaS Data Applications Operating Systems OpenStack Processing and Memory, Data Storage, Network Physical facilities Cloud user Cloud builder

Standards PCI DSS HIPAA / HITECH SOX FedRAMP/FISMA ISO/IEC NIST SP800-53

Typical structure Standard Requirement #1 Control #1.1 Control #1.2 Control #1.NRequirement #2 Requirement #N

CLOUD CONTROLS MATRIX VERSION 3.0 Controls are very similar

Standards are pretty generic: PCI DSS Build and Maintain a Secure Network and Systems 1. Install and maintain a firewall configuration to protect cardholder data 2. Do not use vendor- supplied defaults for system passwords and other security parameters Protect Cardholder Data 3. Protect stored cardholder data 4. Encrypt transmission of cardholder data across open, public networks Maintain a Vulnerability Management Program 5. Protect all systems against malware and regularly update anti- virus software or programs 6. Develop and maintain secure systems and applications Implement Strong Access Control Measures 7. Restrict access to cardholder data by business need to know 8. Identify and authenticate access to system components 9. Restrict physical access to cardholder data Regularly Monitor and Test Networks 10. Track and monitor all access to network resources and cardholder data 11. Regularly test security systems and processes Maintain an Information Security Policy 12. Maintain a policy that addresses information security for all personnel

Cloud Guidelines PCI DSS Virtualization Guidelines PCI DSS Cloud Computing Guidelines NIST Special Publication Guidelines on Security and Privacy in Public Cloud Computing NIST Special Publication Guidelines on Security and Privacy in Public Cloud Computing

PCI DSS Cloud Guidelines Don’t store, process or transmit payment card data in the cloud.

PCI DSS Virtualization Guidelines Requirement 3: Protect stored cardholder data – As well as being present in known locations, cardholder data could exist in archived, off-line or dormant VM images, or be unknowingly moved between virtual systems via dynamic mechanisms such as live migration or storage migration tools. – Sensitive data, such as unencrypted PAN, sensitive authentication data, and cryptographic keys, could be inadvertently captured in active memory and replicated via VM imaging and snapshot functions...

OpenStack Security Guidelines OpenStack Security Guide Securing OpenStack for compliance

Q&A irc: eshumakher

© 2014 PayPal Inc. All rights reserved. Confidential and proprietary. Private Cloud Compliance Scott Carlson

2626 CURRENCIES SUPPORTED 148M ACTIVE REGISTERED ACCOUNTS MARKETS OFFER PAYPAL 8080 LOCALIZED MARKETING SITES GLOBALLY EUROPEAN UNION EURO AUSTRALIAN DOLLAR CANADIAN DOLLAR NEW ZEALAND DOLLAR HUNGARIAN FORINT MALAYSIAN RINGGIT UNITED KINGDOM POUNDS STERLING HONG KONG DOLLAR UNITED STATES DOLLAR TAIWAN NEW DOLLAR CHINESE RMB SWEDISH KRONA SINGAPORE DOLLAR PHILIPPINE PESO BRAZILIAN REAL RUSSIAN RUBLE NORWEGIAN KRONE JAPANESE YEN MEXICAN PESO TURKISH LIRA SWISS FRANC CZECH KORUNA ISRAELI NEW SHEKEL DANISH KRONE THAI BAHT POLISH ZLOTY

148M ACTIVE ACCOUNTS 1 $ 6,688 IN PAYMENTS PROCESSED EVERY SECOND 2 9M PAYMENTS PROCESSED EVERY DAY 3 +6M+6M NEW ACTIVE ACCOUNTS 1 1. Active Registered Accounts: All registered accounts that successfully sent or received at least one payment or payment reversal through our PayPal payments networks, including Bill Me Later and Venmo, and excluding users of Braintree’s unbranded payment checkout solutions, within the last 12 months and which are currently able to transact., 2. Total Payment Volume: Total dollar volume of payments, net of payment reversals, successfully completed through our PayPal payments networks, including Bill Me Later, Venmo, and payments processed through Braintree’s full stack payments platform during the period; excludes payments sent or received through PayPal and Braintree’s payment gateway businesses. 3. Net Total Number of Payments: Total number of payments, net of payment reversals, successfully completed through our PayPal payments networks, including Bill Me Later, Venmo, and payments processed through Braintree’s full stack payments platform during the period; excludes payments sent or received through PayPal and Braintree’s payment gateway businesses. Q Financial Metrics $ 1.8B PAYPAL REVENUES 20% YOY TPV 2 26% YOY $52B$52B

© 2014 PayPal Inc. All rights reserved. Confidential and proprietary. PayPal Cloud & Software Defined Data Center Agility with Security Cloud Design Principals Deploy from Templates Any Image, Anywhere Automatically scale up/down workloads Follow devops auto-deployments CI/CD Respond to intra-cloud events ELASTIC VIRTUAL PCI-DSS 2.0 and 3.0 Local Country Requirements SECURE 20

© 2014 PayPal Inc. All rights reserved. Confidential and proprietary. Compliance requirements Compliant with PCI-DSS 2.0 Standards Non-US locations compliant with local country regulations 21 Compliance Statement:

© 2014 PayPal Inc. All rights reserved. Confidential and proprietary. Basic Methodology Just pretend its infrastructure OpenStack has servers in it Hardware Configured and dedicated to the cloud Hypervisor/Build Image meeting NIST/CIS standard templates Vulnerability Scanning with third party tooling Patching 7, 30, 90 day windows with vendor provided patches to OS Configuration Management for important system files Password Management – non-default, complex and unique! OpenStack has Users in it Do not use shared accounts for anything. Just don’t Log everything (auth) about a user. Send it somewhere you can find it. Keep it a LONG time. 22

© 2014 PayPal Inc. All rights reserved. Confidential and proprietary. Basic Methodology Just pretend its infrastructure Hypervisor Components Its Just Linux. Treat it like hardened Linux and lock it down to standards (CIS, NIST) Have a separate management interface from your production traffic (physical or virtual) Do not combine security zones within a single hypervisor because then it’s ALL “in-scope” Audit Access, Audit changes, be ready to show your work Be ready to defend decisions to share ports for components OpenStack Software Stack Limited vulnerability scanning in a programmatic way, have to build our own (Fortify, AppScan) Getting code from Trunk = Open Source Happiness, but have your licenses reviewed! You still need to code review if CDE passes through here Avoid Avoid Avoid Actual data getting put in your cloud stack (not guest VM’s, those are ok) 23

© 2014 PayPal Inc. All rights reserved. Confidential and proprietary. Basic Methodology Just pretend its infrastructure Physical Network Components? Yep Firewall rules around the cloud to limit ingress and egress Monitor what happens on your firewalls, send it somewhere, keep it a LONG time Make sure the person building your network isn’t the person building your cloud (SOD) Configuration Guidelines exist for most physical installations (avoid virtual for now…) Automation is fine, but make sure you log it, and auto-ticket it. Virtual Network Components? Nope Too early in the testing process to rely on virtual versions of components at scale Okay for intra-tenant traffic with minimal rule set Same rules for physical apply to virtual. Has your third party pen-tested and certified their thing? 24

© 2014 PayPal Inc. All rights reserved. Confidential and proprietary. Basic Methodology Just pretend its infrastructure Data? If its Card-holder data, controls become interesting very quickly Storing things encrypted at rest in VM’s mean you can’t use OpenStack components HSM, crypto, key management required User management, controls over data, logging, all of the standard stuff needed 25

© 2014 PayPal Inc. All rights reserved. Confidential and proprietary. For more information, please contact: Scott