Building trust in the Cloud: the CSA perspective Daniele Catteddu, Managing Director EMEA & OCF-STAR Program Director Cloud Security Alliance © Cloud Security.

Slides:



Advertisements
Similar presentations
Copyright © 2011 Cloud Security Alliance DANIELE CATTEDDU CSA Managing Director EMEA.
Advertisements

1 The Data Protection Officer at work Experience, good practices and lessons learnt Pierre Vernhes – former DPO at the Council of the EU Workshop on Data.
Child Safeguarding Standards
Cloud Security Alliance Research & Roadmap June 2012
Copyright © 2011 Cloud Security Alliance Trusted Cloud Initiative Work Group Session.
In Harmony, In the Cloud: Harmonizing Data Protection Rules In a Cross-Border World Steve Mutkoski Worldwide Director Policy Microsoft Corporation.
Copyright © 2011 Cloud Security Alliance Cloud Controls Matrix Work Group Session Sean Cordero President of Cloudwatchmen,
International Federation of Accountants International Education Standards for Professional Accountants Mark Allison, Executive Director Institute of Chartered.
Copyright © 2014 Cloud Security Alliance Security Certification for Cloud Services : The CSA STAR Certification Daniele Catteddu,
Copyright © 2011 Cloud Security Alliance Keynote.
Copyright © 2011 Cloud Security Alliance.
Security and Privacy SLAs for Cloud services Dr. Jesus Luna, CSA Research Director EMEA Copyright © 2015 Cloud Security Alliance.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © 2012 Cloud Security Alliance – UK & Ireland Liberty Hall, Dublin March 30th 2012.
Security Controls – What Works
Budapest May, 2001 Anne Lehouck European Commission, DG ENTERPRISE 1 ELECTRONIC SIGNATURE LEGAL FRAMEWORK & STANDARDISATION.
1 DCS860A Emerging Technology Physical layer transparency in Cloud Computing (rev )
CloudAudit Working Group Update April CloudAudit Charter Provide a common interface and namespace that allows cloud computing providers to automate.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
3rd session: Corporate Governance
First Practice - Information Security Management System Implementation and ISO Certification.
The ISO/IEC family Lynda Cooper Co-author ISO20000 Project editor ISO20000 part 1 Principal UK Expert to ISO group ITIL Expert.
Internal auditing for credit unions Nuala Comerford, Chair IIA Irish Region Committee Pamela McDonald Council Member IIA Credit Union Summer School Thursday,
Auditing Cloud Computing: Adapting to Changes in Data Management IIA and ISACA Joint Meeting March 12, 2013 Presented by: Jay Hoffman (AEP), John Didlott.
WHERE WE ARE 22 member associations in 20 countries Over 4300 individual members who are responsible for risk management and/or insurance in their organisations.
A Common Immigration Policy for Europe Principles, actions and tools June 2008.
Cloud Security Alliance Research & Roadmap Jim Reavis Executive Director August 2011.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
© Cloud Security Alliance, 2015 Sean Cordero, Chair CCM Laura Posey, Chair CAIQ.
SECURITY Is cloud computing secure? Are Microsoft Online Services secure? Is cloud computing secure? Are Microsoft Online Services secure? PRIVACY What.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
GRC - Governance, Risk MANAGEMENT, and Compliance
Chapter Three IT Risks and Controls.
Romanian Court of Accounts years of existence.
Implementation of the Essential Standards The Australian Quality Framework (AQTF) is the national set of standards which assures nationally consistent,
Cloud Security Alliance Research & Roadmap
12,000 anonymized surveyed results Worldwide user base Cloud Security Readiness Tool Security trends report:
CERTIFICATION In the Electronics Recycling Industry © 2007 IAER Web Site - -
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
10/20/ The ISMS Compliance in 2009 GRC-ISMS Module for ISO Certification.
Europe's work in progress: quality of mHealth Pēteris Zilgalvis, J.D., Head of Unit, Health and Well-Being, DG CONNECT Voka Health Community 29 September.
EU Funding opportunities : Rights, Equality and Citizenship Programme Justice Programme Jose Ortega European Commission DG Justice.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Copyright © 2011 Cloud Security Alliance Cloud Security Alliance Research & Roadmap Jim Reavis, Executive Director, CSA.
© Cloud Security Alliance, 2015 Evelyn de Souza Chair Cloud Security Alliance Data Governance Chair/ Data Privacy and Compliance Leader Cisco Systems.
Samantha Schreiner University of Illinois at Urbana- Champaign BA 559 – Professor Michael Shaw December 15 th, 2008 A Survey of IT Governance Through COBIT,
Audit and Compliance Rosemary Carter Associate Director of Regulatory Compliance.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Cloud security
Assessment Validation. MORE THAN YOU IMAGINE ASQA (Australian Skills Quality Authority) New National Regulator ASQA as of 1 July, 2011.
Daniel Field, Atos Spain Towards the European Open Science Cloud, Heidelberg, 20/01/2016.
D3.2 Procurement Best Practices Interim Report 20 January 2016 Toward the European Open Science Cloud 1 Damir Savanovic, CSA.
TEQSA The Tertiary Education Quality and Standards Agency.
© Cloud Security Alliance, 2015 Sean Cordero, Chair CCM.
© Cloud Security Alliance, 2015 Sean Cordero, Chair CCM.
Harmonised use of accreditation for assessing the competence of various Conformity Assessment Bodies Dr Andreas Steinhorst, EA ERA workshop 13 April 2016,
A Methodology to Evaluate the Trustworthiness and Security Compliance of Cloud Service Providers Sasko Ristov Ss. Cyril and Methodius University, Skopje,
Department of Computer Science Introduction to Information Security Chapter 8 ISO/IEC Semester 1.
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
GDPR (General Data Protection Regulation)
Training Course on Integrated Management System for Regulatory Body
Trilateral Research EUROPEAN COMMISSION
Bob Siegel President Privacy Ref, Inc.
Data protection certification and cloud computing
years of existence.
Presentation to the INTOSAI Working Group on IT Audit Systems assurance and data analytics for continued audit quality and improved efficiency of audits.
What is Interesting in the CCSP certification?
eHealth/mHealth Gisele Roesems
Presentation transcript:

Building trust in the Cloud: the CSA perspective Daniele Catteddu, Managing Director EMEA & OCF-STAR Program Director Cloud Security Alliance © Cloud Security Alliance, 2014.

Global, not-for-profit organization Over 70,000 individual members, more than 300 corporate members, and 65 chapters Building best practices and a trusted cloud ecosystem Agile philosophy, rapid development of applied research GRC: Balance compliance with risk management Reference models: build using existing standards Identity: a key foundation of a functioning cloud economy Champion interoperability Enable innovation Advocacy of prudent public policy © Cloud Security Alliance, ABOUT THE CLOUD SECURITY ALLIANCE “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.”

RESEARCH ADVISE GOVERNMENTS AND PRIVATE COMPANIES EDUCATION – PROFESSIONAL CERTIFICATION – TRAINING PROVIDER CERTIFICATION STANDARDS Events © Cloud Security Alliance, ABOUT THE CLOUD SECURITY ALLIANCE “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.”

© Cloud Security Alliance, 2014.

TRUST? Transparency and Openness Evidence-based assurance Accountability © Cloud Security Alliance, 2014.

THE “BIG ROCKS” OF CLOUD SECURITY, TRUST, AND CONTROL Take care of the big rocks first… Awareness and Education Understand – Assess your risks Identify your requirements Enforce basic security principles: Need to Know Least privilege Monitor, Audit and Certify Use of standards © Cloud Security Alliance, 2014.

7 03/12/2014 © Cloud Security Alliance, Publicly Funded Research

8 03/12/2014 © Cloud Security Alliance, Research Portfolio Our research includes fundamental projects needed to define and implement trust within the future of information technology CSA continues to be aggressive in producing critical research, education and tools Viral adoption + standards incubation + foundation for CSA certifications

9 03/12/2014 © Cloud Security Alliance, Publicly Funded Research A4Cloud: CIRRUS: CloudWATCH: CUMULUS: Helix Nebula: SPECS: PICSE: SLA-Ready:

10 03/12/2014 © Cloud Security Alliance, Security Guidance Industry standard catalog of cloud security issues and best practices Widespread adoption Translated into 6 languages 14 domains Use to help shape your cloud policies and security strategy esearch/security-guidance/

CLOUD CONTROL MATRIX (CCM) CONSENSUS ASSESSMENTS INITIATIVE QUESTIONNAIRE (CAIQ) © Cloud Security Alliance, 2014.

CCM V3.0.1 – 16 CONTROL AREAS © Cloud Security Alliance, 2014.

CCM v3.0.1 New and Updated Mappings including: AICPA 2014 TSC ISO/IEC PCI DSS v3.0 NIST SP R3 App J ENISA IAF 95/46/EC - European Union Data Protection Directive HIPAA / HITECH Act COBIT 5.0 Canada PIPEDA COPPA ODCA UM: PA R2.0 © Cloud Security Alliance, 2014.

CAIQ v3.0.1 Current Version: Released July 10, 2014 Companion to CSA CCM v3.0.1 and aligned to CSA’s Guidance Questions mapped to the compliance requirements in CCM v3.0.1 Helps organizations build assessment processes for cloud providers Helps cloud providers assess their own security posture Improved cohesion between CCM and CAIQ in v3.0.1 Questions updated to facilitate STAR measurement © Cloud Security Alliance, 2014.

ALIGNMENT CCM & CAIQ Controls now directly referenced Numbering & questions linked to control © Cloud Security Alliance, 2014.

The Future of CCM and CAIQ Mapping of ISO27018 and Continue to improve controls: Auditability & Measurement Clarity Intent Revisit the development cycle Evaluate additional candidates for mapping © Cloud Security Alliance, 2014.

CSA GRC VALUE EQUATION CONTRIBUTIONS FOR CONSUMERS AND PROVIDERS What control requirements should I have as a cloud consumer or cloud provider? How do I ask about the control requirements that are satisfied (consumer) or express my claim of control response (provider)? How do I announce and automate my claims of audit support for all of the various compliance mandates and control obligations? How do I know that the controls I need are working for me now (consumer)? How do I provide actual security and transparency of service to all of my cloud users (provider)? Individually useful Collectively powerful Productive way to reclaim end-to-end information risk management capability Individually useful Collectively powerful Productive way to reclaim end-to-end information risk management capability Static claims & assurances Dynamic (continuous) monitoring and transparency © Cloud Security Alliance, 2014.

OPEN CERTIFICATION FRAMEWORK (OCF) / STAR Program © Cloud Security Alliance, 2014.

Launched in 2011, the CSA STAR is the first step in improving transparency and assurance in the cloud. The STAR is a publicly accessible registry that documents the security controls provided by cloud computing offerings Helps users to assess the security of cloud providers Searchable registry to allow cloud customers to review the security practices of providers, accelerating their due diligence and leading to higher quality procurement experiences. It is based on a multilayered structure defined by Open Certification Framework Working Group CSA STAR: SECURITY, TRUST & ASSURANCE REGISTRY © Cloud Security Alliance, 2014.

OPEN CERTIFICATION FRAMEWORK The CSA Open Certification Framework is an industry initiative to allow global, accredited, trusted certification of cloud providers. © Cloud Security Alliance, 2014.

WHAT IS CSA STAR CERTIFICATION? The CSA STAR Certification is a rigorous third-party independent assessment of the security of a cloud service provider. Technology-neutral certification leverages the requirements of the ISO/IEC 27001:2013 & the CSA CCM Integrates ISO/IEC 27001:2013 with the CSA CCM as additional or compensating controls. Measures the capability levels of the cloud service. Evaluates the efficiency of an organization’s ISMS and ensures the scope, processes and objectives are “Fit for Purpose.” Based upon the Plan, Do, Check, Act (PDCA) approach Enables the auditor to assess a company’s performance, on long-term sustainability and risks, in addition to ensuring they are SLA driven. © Cloud Security Alliance, 2014.

APPROVING ASSESSORS They must demonstrate knowledge of the Cloud Sector Either through verifiable industry experience – this can include though assessing organizations Or through completing CCSK certification or equivalent They must be a qualified auditor working a ISO accredited CB Evidence of conducting ISO assessments for a certification body accredited by an IAF member to ISO or their qualifications as an auditor for that organization. They must complete the CSA approved course qualifying them to audit the CCM for STAR Certification © Cloud Security Alliance, 2014.

ACCREDITED CERTIFICATION BODIES © Cloud Security Alliance, 2014.

WHO IS USING CSA STAR? Currently 136 Cloud Service Providers Word Wide have decided to be part of the STAR Program! That includes companies with either STAR Self Assessment (102) or STAR Certification (31) or STAR Attestation (3) Several other in the process of completing their auditing processes © Cloud Security Alliance, 2014.

How about Governments & EU Institutions? Are they requesting CSA

© Cloud Security Alliance, EC and EU Parliament The Directorate-General for Informatics (DIGIT) in a tender that aims to secure about 2500 VM & 2500 Terabytes of storage for a number of EU Institutions (75% of the volume will be reserved for the European Parliament, Council and other EU) requests the candidate tenders to make use of the CSA STAR program to show compliance with security requirements established by the European Security Agency (ENISA). download.html?docFileId=7469 Please check out Annex 2 Security Requirements.

© Cloud Security Alliance, Who else? The EC is just the last (and surely not the least) that recognises the values of our certification and assurance program, prior to them other Governments (e.g. UK, Spain, Taiwan, Singapore, Canada, etc.) has made direct reference to STAR and CCM.

© Cloud Security Alliance, UK G-Cloud example

PRIVACY LEVEL AGREEMENT © Cloud Security Alliance, 2014.

Privacy Level Agreement - PLA V2 EU Compliance Tool

CSA Privacy Level Agreement (PLA [V1]) Goal: Encourage uniform, consistent and streamlined practices for CSPs in handling personal data Facilitate complete and more relevant disclosures Scope & methodology Follows EU Data Protection Directive 95/46/EC principles and EU Commission Proposal for General Data Protection Regulation Addresses WP29 Opinion 5/2012 on Cloud Computing European Data Protection Authorities’ guidelines on cloud contracts and use of cloud computing services

DPA’s opinions on PLA?

CSA Privacy Level Agreement (PLA [V2]) - EU compliance tool Goal: Provide CSPs a tool to achieve EU-wide data protection compliance Provide cloud customer with a tool to evaluate CSP EU-wide data protection compliance Scope & Methodology Deals with the ‘B2B’ scenario Follows EU current Data Protection Law Strongly based on WP29 Opinion 5/2012 on Cloud Computing, written in the light of ISO/IEC 27018, the “Cloud Service Level Agreement Standardisation Guidelines”, the work developed by the Cloud Select Industry Group on Code of Conduct, & the Cloud Accountability Project Considers differences between CSP-controller and CSP-processor

Privacy Level Agreement V2 1. Identity of the CSP (and of representative in the EU as applicable), its role, and the contact information for the data protection inquiries 2. Ways in which the data will be processed 3. Data transfer 4. Data security measures 5. Monitoring 6. Personal Data breach notification 7. Data portability, migration, and transfer back assistance 8. Data retention, restitution, and deletion 9. Accountability 10. Cooperation 11. Legally required disclosure

PLA V2 Table (Annex 1)

? ? ? ? © Cloud Security Alliance, 2015.

THANK YOU! CONTACT US Daniele Catteddu; Managing Director EMEA, Cloud Security / © Cloud Security Alliance, 2015.