Cloud Computing Risk Assessments & Governance Donald Gallien Obinna Nwagbara April 21, 2015.

Slides:



Advertisements
Similar presentations
Distributed Data Processing
Advertisements

Information Systems Audit Program (cont.). PHYSICAL SECURITY CONTROLS.
Chapter 5: Asset Classification
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
Information Systems Audit Program. Benefit Audit programs are necessary to perform an effective and efficient audit. Audit programs are essentially checklists.
Security Controls – What Works
Government Technology Bay Area Technology Forum November 5, 2009 Presented By: Jon Fullinwider Director, Local Government Citrix Systems, Inc. Presented.
Developing a Records & Information Retention & Disposition Program:
Introduction to Cloud Computing and Secure Cloud Computing
02/12/00 E-Business Architecture
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
The Cloud: Demystified Neil Cattermull Frontier Technology.
Wally Kowal, President and Founder Canadian Cloud Computing Inc.
SaaS, PaaS & TaaS By: Raza Usmani
1. 2 New Computing Models, and What They Mean to the Small and Mid Sized Business Consumer How your business can make practical decisions between “The.
Oyinkan Adedun Adeleye Caitlyn Carney Tyler Nguyen.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Cloud Computing Risk Assessments Donald Gallien March 31, 2011.
R ISK M ANAGEMENT AND C LOUD S ECURITY Rodney A. Walsh, CGEIT, CRISC//Director of IT Risk Services Paco Diaz//Senior Consultant II CACUBO Central Association.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Treasury in the Cloud Bob Stark – Vice President, Strategy September 17, 2014.
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 9. Preventing and Responding to Computer Fraud IT Security Ranked #2 Preventing and Responding.
© Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Buying factors – HP.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Managing User Accounts, Passwords and Logon Chapter 5 powered by dj.
In the name of God :).
Cloud and the K-12 Community. 2 Cloud? What is the Cloud? XaaS: Software - SaaS Platform - PaaS Infrastructure - IaaS.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
LEGAL ISSUES IN CLOUD COMPUTING
Speaker: Meng-Ting Tsai Date:2010/11/25 The Information Assurance Practices of Cloud Computing Vendors IEEE Communications Society.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Cloud Computing Use Case Draft v2.
General Concerns on WWW Security Name: Huaying Chen ID# Instructor: Dr Mort Anvari.
Chapter 8 Auditing in an E-commerce Environment
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
SAS No. 70, Service Organizations A standard for reporting on a service organization’s controls affecting user entities' financial statements. Only for.
Secure Services Shared Hosted MS Exchange 2010.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
Managed IT Services JND Consulting Group LLC
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Clouding with Microsoft Azure
Prof. Jong-Moon Chung’s Lecture Notes at Yonsei University
Use Cloud Computing to Achieve Small Enterprise Savings
Review of IT General Controls
Unit 3 Virtualization.
Chapter 6: Securing the Cloud
Understanding The Cloud
Avenues International Inc.
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
Hot Topics:Mobility in the Cloud
Auditing Cloud Services
Session 11 Other Assurance Services
Microsoft SharePoint Server 2016
Introduction to the Federal Defense Acquisition Regulation
Service Organization Control (SOC)
Power BI Security Best Practices
Chapter 21: Cloud Computing and Related Security Issues
Chapter 22: Cloud Computing Technology and Security
Cloud Testing Shilpi Chugh.
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
NIST Cloud Computing Reference Architecture
PLANNING A SECURE BASELINE INSTALLATION
Cloud Security AWS as an example.
Cloud Security AWS as an example.
Cloud Computing for Wireless Networks
Presentation transcript:

Cloud Computing Risk Assessments & Governance Donald Gallien Obinna Nwagbara April 21, 2015

2 Overview  Introductions  Cloud Models and Inherent Risk  Cloud Computing Risk Ranking Model  Cloud Computing Governance Activities  Questions

3 Presenters  Donald Gallien, American Express, Vice President  Obinna Nwagbara, American Express, Senior Manager

4 Quiz  Amazon Web Services (EC2) is an example of which deployment model: a. Public b. Hybrid c. Private d. All of the above

5 Overview Risk Assessment Governance Activities Deployment Model Service Model Other Risk Dimensions

Cloud Models and Inherent Risk

7 Deployment Models ModelDefinition PublicAvailable to the general public or a large industry group HybridPrivate cloud foundation combined with the strategic use of public cloud PrivateOperated solely for an organization

8 Deployment Model Risk Profile HigherLower PublicPrivateHybrid Likelihood of Data Security, Privacy, and Control Breach

9 Service Models ModelDefinition Infrastructure as a Service (IaaS) Fundamental computing resources to deploy software, including OS and applications Platform as a Service (PaaS) Applications based on programming languages and tools supported by the cloud provider Software as a Service (SaaS) Cloud provider applications running on a cloud infrastructure

10 Service Model Complexity SaaS PaaS IaaS StructuredSimple Flexible Complex

11 Service Model Risk Profile HigherLower IaaSSaaSPaaS Impact of Loss of Control & Security Breach

12 Section Summary  Deployment and Service Models are key drivers of cloud governance needs  Public clouds provide less security and service  Private clouds align better with technology and security standards  IaaS models are very broad in scope and flexible  SaaS models are narrow in scope and structured

Cloud Computing Risk Ranking Model

14 A few thoughts before we start  Risk models include elements of judgment and must fit the organization  Some of our risk model assumptions may be completely wrong for your organization  We come from a large financial services company, and fundamentally believe our company can do any important IT process as well as anyone with less risk  You will need to customize for your organization  Risk ranking scores must drive governance requirements and audit activities

15 Cloud Risk Scoring Model Example AttributeHigh (9)Medium (5)Low (1) Deployment Model *PublicHybridPrivate Service Model *IaaSPaaSSaaS Data SecuritySecretRestrictedUnclassified Hosting SiteUnknownInternationalDomestic Customer FacingYesNo Dependent Applications <10 Recovery Time4 hours1 week1 month Data RetentionRequiredNot Required * - Consider rating these attributes more heavily than the others

16 Deployment Mode l HighMediumLow Deploy Model PublicHybridPrivate - Security and privacy may not be a priority - Service level agreements may not exist - Private environments provide adequate security and privacy - Service level agreements should exist Public Private

17 Service Model HighMediumLow Service Model IaaSPaaSSaaS - Issues may broadly impact all hosted applications and data - No control over foundational general controls - PaaS - Impact limited to outsourced platform - SaaS - Impact limited to applications and data IaaS SaaS

18 Data Security HighMediumLow Security Level SecretRestrictedUnclassified - May be difficult to enforce security standards when in cloud - May be difficult to demonstrate compliance with regulations like GLBA - Security and privacy is not a concern (making unclassified data a good candidate for cloud computing) Secret Unclassified

19 Hosting Site HighMediumLow Hosting Site UndefinedInternational Location Domestic Location - May result in cross border data protection regulatory issues - May be difficult to demonstrate compliance with regulations like GLBA - Minimizes concerns about cross border data protection regulations Undefined Domestic Location

20 Customer Facing HighMediumLow Customer Facing YesNo - Perhaps internally hosted applications are better for critical customer interactions, especially for those with regulatory or brand implications - Non critical customer applications may be good candidates for cloud computing Yes No

21 Dependent Applications HighMediumLow Number of Apps <10 - Implies complexity and greater organizational significance - Implies simplicity and less organizational significance 21+ < 10

22 Recovery Time Objectives (RTO) HighMediumLow RTO4 Hours1 Week1 Month - Implies higher business importance – good candidate for cloud computing - Cloud configuration may lack geographic diversity - Implies lower business importance - good candidate for cloud computing 4 Hours 1 Month

23 Data Retention HighMediumLow RetentionRequiredNot Required - Snapshot backups may be difficult to obtain in SaaS environment (may lack functionality) - May be good candidate for cloud computing Required Not Required

24 Section Summary  Cloud risk ranking attributes and scoring must vary based on environment and need  Risk attributes and scoring require alignment with organizational standards What other risk attributes might you use, and how would your rank them on a high, medium, low basis?

Cloud Computing Governance Activities

26 Cloud Governance Requirements Cloud Risk Ranking Minimum Governance Required Minimum Governance Frequency High (>40) SSAE 16 SOC 2 Type II, CCC Testing, SLA Monitoring, Internal Audits Annually Medium (21-39) SSAE 16 SOC 2 Type I, SLA Monitoring Every Two Years Low (<20) Re-validate Risk Assessment Every Three Years Governance should be driven by risk assessment

27 SSAE 16 SOC 2 Reports  SOC 2 “Reports on Controls at a Service Organization over Security, Availability, Processing Integrity, Confidentiality, or Privacy”  Report is appropriate for Cloud Service Providers AttributeType IType II Period of CoveragePoint in TimePeriod of Time Type of CoverageControl DesignControl Design and Operating Effectiveness Description of the Service Organization’s “System” Yes Management Control Assertion Yes

28 SFDC - Complementary Control Considerations Examples Logical Security Password Parameters Security Administration Browser Configuration IP Address Restrictions Backup & Recovery Backup, retention, and rotation Other Data Classification Regulatory Compliance (HIPAA, GLBA, etc.) Complementary Control Considerations are the controls that should be in place at the client side for the controls within the report to be considered fully operational (see Appendix 1)

29 Routine Vendor Governance  Pre-contract and post-contract procedures to demonstrate vendor governance  May be accomplished through security and privacy questionnaires  Governance should be required by contract and monitored via Service Level Agreements (SLAs)  Vendor Relationship Manager must have technical skills to ensure appropriate governance

30  The Twitter Entities make no warranty and disclaim all responsibility and liability for:  (i) the completeness, accuracy, availability, timeliness, security or reliability of the Services or any Content  (ii) any harm to your computer system, loss of data, or other harm that results from your access to or use of the Services or any Content  (iii) the deletion of, or the failure to store or to transmit, any Content and other communications maintained by the Services  (iv) whether the Services will meet your requirements or be available on an uninterrupted, secure, or error-free basis. Social Media Terms of Service

31 Potential Social Media Control s  Social Media Policy  Approvals for Use and Content  Offer Fulfillment Monitoring  Monitoring What is Said  Appropriate use of Tools (see Appendix 2) for Managing Administrative Access, Backups, Audit Trail, Content Approvals, Availability, Monitoring, etc. SSAE 16

32 AWS Shared Security Responsibilities (EC2)  You must secure anything you put in the infrastructure  Security configuration varies depending on how sensitive your data is and services you select  Examples include:  patching the guest OS and as any software you install  configuring the firewall that allows outside access  configuring VPC subnets  setting access control policies for each your storage buckets  configuring encryption options for the stored data  specifying backup and archiving preferences

33 Governing IaaS  Very complex to securely configure  100s of settings – everything from memory, CPU, storage, network, firewall, load balancing, etc  Requires server and network architect engineer skills much like physical data center  Could require numerous audits of “IaaS General Controls” (i.e., user managed configurations) to determine compliance with internal security standards  Internal Audit and other governance requirements may not be much different from in-sourced model

34 Section Summary  Risk Ranking models must drive governance requirements  SSAE 16 SOC 2 Type II will provide most independent audit assurance  Ensure existence and effectiveness of complementary controls  Verify cloud services are configured in accordance with your information security standards  SaaS may be fairly straightforward (with the potential exception of Social Media)  IaaS can be complex and require a lot of technical skills to assess

35 Questions Contact Information:

Salesforce.com (SFDC) User Managed Configurations Appendix 1

37 SFDC Password Configurations Parameter Recommended Setting SFDC Default Setting Ref* Encrypted Custom Fields When required by regulations Not Used55 User passwords expire inNo greater than 90 days90 days41 Enforce password history12 or more341 Minimum password length8 characters841 Password complexity requirement Must mix alpha, numeric, and special characters Must mix alpha and numeric 41 Password question requirement Password hint cannot contain password 42 Maximum invalid login attemptsMaximum of * - SFDC Security Implementation Guide Page Number

38 Other SFDC Configurations Parameter Recommended Setting SFDC Default SettingRef* Lockout effective period60 minutes or more15 minutes42 Restricting Login IP RangesExternal firewallsDisabled44 Restricting Login HoursEnableDisabled45 Timeout value60 minutes2 hours46 Disable session timeout warning popupCheckedNot checked46 Require secure connections (HTTPS)Enabled 47 Enable caching and password auto- complete on login page DisabledEnabled47 * - SFDC Security Implementation Guide Page Number

Social Media Tools Appendix 2

40 Resources for Social Media Tools TopicResources Account Management enterprise/tracking-down-the-right-social-media-management-tool/ Content (Compliance) Monitoring & Analytics media-monitoring-analytics-and-management-2013 Archivinghttp:// e_to_help_firms_track_social_media/ Archivinghttp://financialsocialmedia.com/search-engine-optimization-seo/the- best-social-media-compliance-products-for-financial-professionals/ SMMShttp://searchengineland.com/buyers-guides/enterprise-social-media- management-software-a-buyers-guide