Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cloud Computing Risk Assessments & Governance Donald Gallien Obinna Nwagbara April 21, 2015.

Similar presentations


Presentation on theme: "Cloud Computing Risk Assessments & Governance Donald Gallien Obinna Nwagbara April 21, 2015."— Presentation transcript:

1 Cloud Computing Risk Assessments & Governance Donald Gallien Obinna Nwagbara April 21, 2015

2 2 Overview  Introductions  Cloud Models and Inherent Risk  Cloud Computing Risk Ranking Model  Cloud Computing Governance Activities  Questions

3 3 Presenters  Donald Gallien, American Express, Vice President  Obinna Nwagbara, American Express, Senior Manager

4 4 Quiz  Amazon Web Services (EC2) is an example of which deployment model: a. Public b. Hybrid c. Private d. All of the above

5 5 Overview Risk Assessment Governance Activities Deployment Model Service Model Other Risk Dimensions

6 Cloud Models and Inherent Risk

7 7 Deployment Models ModelDefinition PublicAvailable to the general public or a large industry group HybridPrivate cloud foundation combined with the strategic use of public cloud PrivateOperated solely for an organization

8 8 Deployment Model Risk Profile HigherLower PublicPrivateHybrid Likelihood of Data Security, Privacy, and Control Breach

9 9 Service Models ModelDefinition Infrastructure as a Service (IaaS) Fundamental computing resources to deploy software, including OS and applications Platform as a Service (PaaS) Applications based on programming languages and tools supported by the cloud provider Software as a Service (SaaS) Cloud provider applications running on a cloud infrastructure

10 10 Service Model Complexity SaaS PaaS IaaS StructuredSimple Flexible Complex

11 11 Service Model Risk Profile HigherLower IaaSSaaSPaaS Impact of Loss of Control & Security Breach

12 12 Section Summary  Deployment and Service Models are key drivers of cloud governance needs  Public clouds provide less security and service  Private clouds align better with technology and security standards  IaaS models are very broad in scope and flexible  SaaS models are narrow in scope and structured

13 Cloud Computing Risk Ranking Model

14 14 A few thoughts before we start  Risk models include elements of judgment and must fit the organization  Some of our risk model assumptions may be completely wrong for your organization  We come from a large financial services company, and fundamentally believe our company can do any important IT process as well as anyone with less risk  You will need to customize for your organization  Risk ranking scores must drive governance requirements and audit activities

15 15 Cloud Risk Scoring Model Example AttributeHigh (9)Medium (5)Low (1) Deployment Model *PublicHybridPrivate Service Model *IaaSPaaSSaaS Data SecuritySecretRestrictedUnclassified Hosting SiteUnknownInternationalDomestic Customer FacingYesNo Dependent Applications21+10-20<10 Recovery Time4 hours1 week1 month Data RetentionRequiredNot Required * - Consider rating these attributes more heavily than the others

16 16 Deployment Mode l HighMediumLow Deploy Model PublicHybridPrivate - Security and privacy may not be a priority - Service level agreements may not exist - Private environments provide adequate security and privacy - Service level agreements should exist Public Private

17 17 Service Model HighMediumLow Service Model IaaSPaaSSaaS - Issues may broadly impact all hosted applications and data - No control over foundational general controls - PaaS - Impact limited to outsourced platform - SaaS - Impact limited to applications and data IaaS SaaS

18 18 Data Security HighMediumLow Security Level SecretRestrictedUnclassified - May be difficult to enforce security standards when in cloud - May be difficult to demonstrate compliance with regulations like GLBA - Security and privacy is not a concern (making unclassified data a good candidate for cloud computing) Secret Unclassified

19 19 Hosting Site HighMediumLow Hosting Site UndefinedInternational Location Domestic Location - May result in cross border data protection regulatory issues - May be difficult to demonstrate compliance with regulations like GLBA - Minimizes concerns about cross border data protection regulations Undefined Domestic Location

20 20 Customer Facing HighMediumLow Customer Facing YesNo - Perhaps internally hosted applications are better for critical customer interactions, especially for those with regulatory or brand implications - Non critical customer applications may be good candidates for cloud computing Yes No

21 21 Dependent Applications HighMediumLow Number of Apps 21+10-20<10 - Implies complexity and greater organizational significance - Implies simplicity and less organizational significance 21+ < 10

22 22 Recovery Time Objectives (RTO) HighMediumLow RTO4 Hours1 Week1 Month - Implies higher business importance – good candidate for cloud computing - Cloud configuration may lack geographic diversity - Implies lower business importance - good candidate for cloud computing 4 Hours 1 Month

23 23 Data Retention HighMediumLow RetentionRequiredNot Required - Snapshot backups may be difficult to obtain in SaaS environment (may lack functionality) - May be good candidate for cloud computing Required Not Required

24 24 Section Summary  Cloud risk ranking attributes and scoring must vary based on environment and need  Risk attributes and scoring require alignment with organizational standards What other risk attributes might you use, and how would your rank them on a high, medium, low basis?

25 Cloud Computing Governance Activities

26 26 Cloud Governance Requirements Cloud Risk Ranking Minimum Governance Required Minimum Governance Frequency High (>40) SSAE 16 SOC 2 Type II, CCC Testing, SLA Monitoring, Internal Audits Annually Medium (21-39) SSAE 16 SOC 2 Type I, SLA Monitoring Every Two Years Low (<20) Re-validate Risk Assessment Every Three Years Governance should be driven by risk assessment

27 27 SSAE 16 SOC 2 Reports  SOC 2 “Reports on Controls at a Service Organization over Security, Availability, Processing Integrity, Confidentiality, or Privacy”  Report is appropriate for Cloud Service Providers AttributeType IType II Period of CoveragePoint in TimePeriod of Time Type of CoverageControl DesignControl Design and Operating Effectiveness Description of the Service Organization’s “System” Yes Management Control Assertion Yes

28 28 SFDC - Complementary Control Considerations Examples Logical Security Password Parameters Security Administration Browser Configuration IP Address Restrictions Backup & Recovery Backup, retention, and rotation Other Data Classification Regulatory Compliance (HIPAA, GLBA, etc.) Complementary Control Considerations are the controls that should be in place at the client side for the controls within the report to be considered fully operational (see Appendix 1)

29 29 Routine Vendor Governance  Pre-contract and post-contract procedures to demonstrate vendor governance  May be accomplished through security and privacy questionnaires  Governance should be required by contract and monitored via Service Level Agreements (SLAs)  Vendor Relationship Manager must have technical skills to ensure appropriate governance

30 30  The Twitter Entities make no warranty and disclaim all responsibility and liability for:  (i) the completeness, accuracy, availability, timeliness, security or reliability of the Services or any Content  (ii) any harm to your computer system, loss of data, or other harm that results from your access to or use of the Services or any Content  (iii) the deletion of, or the failure to store or to transmit, any Content and other communications maintained by the Services  (iv) whether the Services will meet your requirements or be available on an uninterrupted, secure, or error-free basis. www.twitter.com/tos Social Media Terms of Service

31 31 Potential Social Media Control s  Social Media Policy  Approvals for Use and Content  Offer Fulfillment Monitoring  Monitoring What is Said  Appropriate use of Tools (see Appendix 2) for Managing Administrative Access, Backups, Audit Trail, Content Approvals, Availability, Monitoring, etc. SSAE 16

32 32 AWS Shared Security Responsibilities (EC2)  You must secure anything you put in the infrastructure  Security configuration varies depending on how sensitive your data is and services you select  Examples include:  patching the guest OS and as any software you install  configuring the firewall that allows outside access  configuring VPC subnets  setting access control policies for each your storage buckets  configuring encryption options for the stored data  specifying backup and archiving preferences

33 33 Governing IaaS  Very complex to securely configure  100s of settings – everything from memory, CPU, storage, network, firewall, load balancing, etc  Requires server and network architect engineer skills much like physical data center  Could require numerous audits of “IaaS General Controls” (i.e., user managed configurations) to determine compliance with internal security standards  Internal Audit and other governance requirements may not be much different from in-sourced model

34 34 Section Summary  Risk Ranking models must drive governance requirements  SSAE 16 SOC 2 Type II will provide most independent audit assurance  Ensure existence and effectiveness of complementary controls  Verify cloud services are configured in accordance with your information security standards  SaaS may be fairly straightforward (with the potential exception of Social Media)  IaaS can be complex and require a lot of technical skills to assess

35 35 Questions Contact Information: Donald.W.Gallien@aexp.com Obinna.K.Nwagbara@aexp.com

36 Salesforce.com (SFDC) User Managed Configurations Appendix 1

37 37 SFDC Password Configurations Parameter Recommended Setting SFDC Default Setting Ref* Encrypted Custom Fields When required by regulations Not Used55 User passwords expire inNo greater than 90 days90 days41 Enforce password history12 or more341 Minimum password length8 characters841 Password complexity requirement Must mix alpha, numeric, and special characters Must mix alpha and numeric 41 Password question requirement Password hint cannot contain password 42 Maximum invalid login attemptsMaximum of 61042 * - SFDC Security Implementation Guide Page Number

38 38 Other SFDC Configurations Parameter Recommended Setting SFDC Default SettingRef* Lockout effective period60 minutes or more15 minutes42 Restricting Login IP RangesExternal firewallsDisabled44 Restricting Login HoursEnableDisabled45 Timeout value60 minutes2 hours46 Disable session timeout warning popupCheckedNot checked46 Require secure connections (HTTPS)Enabled 47 Enable caching and password auto- complete on login page DisabledEnabled47 * - SFDC Security Implementation Guide Page Number

39 Social Media Tools Appendix 2

40 40 Resources for Social Media Tools TopicResources Account Management http://www.techrepublic.com/blog/social-media-in-the- enterprise/tracking-down-the-right-social-media-management-tool/ Content (Compliance) http://blogs.hbr.org/cs/2012/08/social_media_compliance_isnt.html Monitoring & Analytics http://socialmediatoday.com/pamdyer/1458746/50-top-tools-social- media-monitoring-analytics-and-management-2013 Archivinghttp://www.abajournal.com/magazine/article/new_tools_are_availabl e_to_help_firms_track_social_media/ Archivinghttp://financialsocialmedia.com/search-engine-optimization-seo/the- best-social-media-compliance-products-for-financial-professionals/ SMMShttp://searchengineland.com/buyers-guides/enterprise-social-media- management-software-a-buyers-guide


Download ppt "Cloud Computing Risk Assessments & Governance Donald Gallien Obinna Nwagbara April 21, 2015."

Similar presentations


Ads by Google