Risk Management & Legal Issues in Cloud Practice Christopher Dodorico Director, PricewaterhouseCoopers Wednesday, October 10, 2012.

Slides:



Advertisements
Similar presentations
Project Quality Plans Gillian Sandilands Director of Quality
Advertisements

Module N° 4 – ICAO SSP framework
© 2012 Open Grid Forum Simplifying Inter-Clouds October 10, 2012 Hyatt Regency Hotel Chicago, Illinois, USA.
Innovation or Necessity? ISM 158 By: Sepehr Saeb.
EMS Checklist (ISO model)
Internal Control–Integrated Framework
Environmental Management System Implementation
IMFO Audit & Risk Indaba June 2012
Copyright © 2011 Cloud Security Alliance Trusted Cloud Initiative Work Group Session.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Federal Risk and Authorization Management Program (FedRAMP) Lisa Carnahan, Computer Scientist National Institute of Standards & Technology Standards Coordination.
Navigating Compliance Requirements DCM 6.2 Regs and Codes linford & co llp.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
MFRPS Lesson Learned North Carolina
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Security Controls – What Works
Information Security Policies and Standards
Coordinating Center Overview November 18, 2010 SPECIAL DIABETES PROGRAM FOR INDIANS Healthy Heart Project Initiative: Year 1 Meeting 1.
Office of Inspector General (OIG) Internal Audit
RC14001 ® Update GPCA Responsible Care Committee September 23, 2013.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
Patch Management Strategy
Corporate Governance: Beyond Compliance at a time of Recession Prof. Ashley G. Frank BA(Econ)[Magna Cum Laude], MDPA (Cum Laude], MBA, MCom [Cum Laude],
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
IT – Towards User Defined Services
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Integrated Capability Maturity Model (CMMI)
Jim Reavis, Executive Director Cloud Security Alliance November 22, 2010 Developing a Baseline On Cloud Security.
Evolving IT Framework Standards (Compliance and IT)
FY2010 PEMP Notable Outcomes October 15, FRA, LLC Board of Directors 10/15-16/2009 Office of Quality and Best Practices Performance Evaluation Management.
Security and Privacy Services Cloud computing point of view October 2012.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Xiaoyue Jiu, Fola Oyediran, Eboni Strawder | Group 10
Roles and Responsibilities
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
The 2009 HIMSS Security Survey: Insights into the Status of Healthcare Security Implementation sponsored by Symantec Meeting of the HIT Standards Committee,
Cyber Authentication Renewal Project Executive Overview June – minute Brief.
CERTIFICATION In the Electronics Recycling Industry © 2007 IAER Web Site - -
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Does the Third Package provide the European TSO associations with the tools necessary to find solutions to the European energy challenge ? Nigel Sisman,
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Cloud Market Readiness Report Finance, Media, and Legal Sectors March 2014 Trend Consulting 2013.
Quality Assuring Deliverers of Education and Training for the Nuclear Sector Jo Tipa Operations Director National Skills Academy for Nuclear.
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
ICP 8 – Risk Management and Internal Controls Ekrem Sarper Vice Chair, Implementation Committee San Jose, Costa Rica.
RECOMMENDATIONS OF THE GOVERNOR ’ S TASK FORCE ON CONTRACTING AND PROCUREMENT REVIEW Report Overview PD Customer Forum September 2002.
State of Georgia Release Management Training
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Is Vendor Management The New Risk Management? Douglas DeGrote.
Voluntary Standards and Government: Working Together A Positive Collaboration Benefits Both the Public and Private Sectors Presentation by Mary C. McKiel,
The NIST Special Publications for Security Management By: Waylon Coulter.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
1Third Party Assurance Optimization and Control RationalizationCopyright © 2016 Deloitte Development LLC. All rights reserved. Third-Party Assurance (TPA)
1© Copyright 2016 EMC Corporation. All rights reserved. VIEWTRUST SOFTWARE OVERVIEW RISK MANAGEMENT AND COMPLIANCE MONITORING.
ISO 37001: Anti-Bribery Management System Standard
Understanding The Cloud
Gain Control of Cloud Integration Strategies Before they Float Away
Auditing Cloud Services
ISO 37001: Anti-Bribery Management System Standard
Setting Actuarial Standards
ISO 37001: Anti-Bribery Management System Standard
Contact Center Security Strategies
Tips on Privacy Audits and Assessments Insurance Consumer Affairs Exchange October 2, 2005 Kirk Herath, CPO & Associate General Counsel, Nationwide Insurance.
ISO 37001: Anti-Bribery Management System Standard
ISO 37001: Anti-Bribery Management System Standard
IT Management Services Infrastructure Services
Presentation transcript:

Risk Management & Legal Issues in Cloud Practice Christopher Dodorico Director, PricewaterhouseCoopers Wednesday, October 10, 2012

Cloud Computing in the US Federal Government – Where are we today? The pace of cloud adoption by federal agencies is picking up Agencies are starting to “dip their toe in the water” and “learn as they go” Embracing the possibilities of cost savings and efficiencies Federal agencies see positive movement in the long-awaited framework for cloud providers to address security concerns in a homogenous manner, with a common controls framework Slide 2

Cloud Computing in the US Federal Government – Where are we at today? Despite this positive initial movement, agencies are still concerned about security of the cloud Issues of working with service providers to manage a myriad of compliance requirements, data location, multi-tenancy, and security continue to concern federal agencies contemplating a movement to the cloud Agencies should not rely solely on FedRAMP for information assurance Need for automated audit and assessment tools, as well as continuous monitoring Initial migration of lower-risk and “less mission-critical” operations to the cloud, as a first step Slide 3

Cloud Computing in the US Federal Government – Where are we at today? However, the outlook is still bright The combination of education, experience and emerging standards should increase cloud adoption in government Security concerns may decrease over time due to continuous process improvement Harmonizing multiple, overlapping regulatory requirements through Integrated Compliance are critical Patience and Strategy are key – as cloud computing technology, security and cost savings mature, federal agencies will become more comfortable with placing key information in the cloud Slide 4

Cloud Security Compliance - FedRAMP The Federal Risk and Authorization Management Program (FedRAMP) establishes the first regulatory program to provide: -A standard, mandatory common controls framework for federal Cloud Service Providers (CSPs) -A standard approach for conducting security assessments of cloud-based systems by Third Party Assessment Organization (3PAO) -Published controls that are entry into market Positive trend toward reuse/reapplication Yet another compliance requirement? Slide 5

Integrated Compliance Integrate Cloud Compliance with Existing Control Frameworks 6 FISMA / FedRAMP Taking Requirements….. PCI HIPAA ISO Other Requirements Identifying Common Controls or Processes…. Integrated Control Framework Documenting policy, controls, and criteria that meet minimum requirements across standards…. Execute Integrated Program Executing the program with the integrated framework. Define & Assess Risk Identify Data Sources Develop & Implement Controls Audit and Correct Enforce, Monitor & Support Access Controls Passwords Encryption Training Risk Assessments

Critical Success Factors for Cloud Compliance Cloud environments, and more so public cloud environments, present a unique challenge with respect to the sharing of responsibilities for security controls between the CSP and the user organization Appropriate scoping of the environment, location of data, boundary definition, security controls demarcation and clarity about responsibility is critical! Slide 7 SaaSThe cloud provider assumes primary responsibilities for security, and consumers control limited service settings IaaSThe consumer has the greatest responsibilities for security. Due to extensibility, security is required across all layers of implementation PaaSResponsibility lies somewhere in the middle, with extensibility and security features that must be leveraged by the customer

Critical Success Factors for Cloud Compliance Understanding data access controls, specifically: -How is data classified in a multi-tenant environment? -How is data classified if multiple organizations are stored in the same data set? -How is logical access granted to specific data sets? -What access control mechanisms are used? Development, deployment and ongoing management of a cloud environment require significant attention to governance. -A cloud environment by nature cannot be static as customers and capabilities are changing constantly, and must scale to meet changing business objectives and regulatory requirements. Slide 8

Critical Success Factors for Cloud Compliance Definition of what qualifies as a “Significant Change” -CSPs and their customers each have a point of view -Dialogue between CSPs and their customers to come to joint agreement on what might trigger re-accreditation or re-assessment Collaboration between subscribers (federal agencies), CSPs, authoritative bodies, assessors/auditors, member organizations and software vendors is critical to the success of federal cloud computing -Design and development of robust SLAs, legal agreements -Agreement on applicable control requirements and areas where “scale-up” may be necessary -Government is doing good job of outreach Slide 9

PwC PwC’s Washington Federal Practice assists our federal and commercial clients with their IT regulatory and cloud compliance challenges Christopher P. Dodorico, Director