SlideShare uma empresa Scribd logo
1 de 17
Keynote address: Securing the cloudJuly 28, 2011 Phil Agcaoili Cloud Security Alliance, Co-founding member CSA Cloud Controls Matrix (CCM), Inventor and co-author CSA GRC Stack , Co-founder and committee co-chair CSA Atlanta Chapter, Founder and Chapter Officer
2 Customers of Cloud Enterprises – large scale services  Outsource whole-sale IT services such as payroll, HR/benefits, CRM, help desk/service desk, etc. Startups — developers using Web at scale Web-based business, SaaS, collaboration services, widget providers, mobile services, and social networking Small businesses — using SaaS  Online businesses, online presence, collaboration, and enterprise integration Enterprises — developers and one-off projects R&D projects, quick promotions, widgets, online collaboration, partner integration, social networking, and new business ventures Firms — with compute intensive tasks Overnight ad placement or transportation calculations  “If you move your data centre to a cloud provider, it will cost a tenth of the cost.” – Brian Gammage, Gartner Fellow “Using cloud infrastructures saves 18% to 29% before considering that you no longer need to buy for peak capacity” - George Reese, founder Valtira and enStratus “Web service providers offer APIs that enable developers to exploit functionality over the Internet, rather than delivering full-blown applications.” - Infoworld
3 “In the Cloud, step one is trusting, and that's not security — that's hope.”                       		-  Andrew Walls, Gartner Group You cannot outsource responsibility.
4 Top Threats of Cloud Computing CSA Research Study Findings: Shared Technology Vulnerabilities Data Loss/Data Leakage Malicious Insiders Interception or Hijacking of Traffic Insecure APIs Account/Service Hijacking Nefarious Use of Service HTTP://CLOUDSECURITYALLIANCE.ORG/TOPTHREATS
5 Cloud Security = Loss of Control Loss of Direct access - In the Cloud you are at least one step removed Multi-tenancy – not an issue in private computing, no shared devices or services Commingling – will your data be mixed in with other clients?  How will it be segregated? Resource Pooling – how will resource conflicts be resolved?  Who gets first response? Ineffective data deletion – if you change providers does your data get destroyed? Unintentional destruction? Legal snafus/data exhaust – if Company A has their data subpoenaed and your data is also on the same device, what happens to your data? Traditional Security ModelNew Security Model
6 Moving to the Cloud Assess the business Assess the culture Assess the value Understand your data Understand your services Understand your processes Understand the cloud resources Identify candidate data Identify candidate services Identify candidate processes Create a governance strategy Bind candidate services to data and processes Relocate services, processes, and information   Implement security Implement governance Implement operations Create a security strategy
7 Secure Adoption of the Cloud Understand the threats and the risks CSA Guidance Identify the asset for the cloud deployment Evaluate the asset Map the asset to potential cloud deployment models Evaluate potential cloud service models and providers Sketch the potential data flow https://wiki.cloudsecurityalliance.org/guidance Mitigating the risks Legal contracts and SLAs with Cloud Service Providers (CSPs) CSA Atlanta Chapter Project 2 – Contractual Guidance (coming soon) Audits, Attestations, and Certifications for Cloud Trust and Assurance ISO 27001 Certification Amazon ISO 27001 SAS 70 Type II FISMA moderate Authority to Operate HIPAA - Current customer deployments Whitepaper describes the specifics 	http://aws.amazon.com/security AICPA SSAE 16 (SOC 1, 2, and 3) / ISAE 3402 Replaced SAS 70 as of June 2011 CSA STAR (coming soon) and CSA GRC Stack standards usage Microsoft Office 365 (formerly BPOS) ISO27K to CSA CCM Mapping http://www.microsoft.com/download/en/details.aspx?id=26647 CloudAudit Cloud Controls Matrix (CCM) Consensus Assessments Initiative Questionnaire (CAIQ) Cloud Trust Protocol (CTP)
CSA Governance, Risk, and Compliance (CSA GRC) Stack Provider Assertions Suite of tools, best practices and enabling technology Consolidate industry research & simplify GRC in the cloud For cloud providers, enterprises, solution providers and audit/compliance Controls Framework, Questionnaire and Continuous Controls Monitoring Automation Simplifies customer and cloud provider attestation to accelerate cloud adoption  https://cloudsecurityalliance.org/grc-stack Private & Public Clouds Control Requirements
CSA GRC StackIndustry Collaboration & Support ,[object Object]
ISO/IEC JTC 1 SC 27 (“SC 27”)  WG 1, 4 and 5 in Study Period in the area of Cloud Computing Security and Privacy
European Network and Information Security Agency (ENISA)
Common Assurance Maturity Model (CAMM)
American Institute of Certified Public Accountants (AICPA)
Statement on Standards for Attestation Engagements (SSAE) No. 16 SOC 2 – Service Organization Controls over Security, Confidentiality, Processing Integrity, Availability, and Privacy
Next generation SAS 70 Type I and II attestation
National Institute of Standards and Technology (NIST)
Consolidated feedback on Federal Risk and Authorization Management Program (FedRAMP)

Mais conteúdo relacionado

Mais de Phil Agcaoili

Cybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the NoiseCybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the NoisePhil Agcaoili
 
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the MinePhil Agcaoili
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philAPhil Agcaoili
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingPhil Agcaoili
 
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Phil Agcaoili
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Phil Agcaoili
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Phil Agcaoili
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidPhil Agcaoili
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...Phil Agcaoili
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Phil Agcaoili
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityPhil Agcaoili
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13Phil Agcaoili
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityPhil Agcaoili
 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsPhil Agcaoili
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryPhil Agcaoili
 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final ReportPhil Agcaoili
 
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterPhil Agcaoili
 

Mais de Phil Agcaoili (18)

Cybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the NoiseCybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the Noise
 
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
 
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber Security
 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 February
 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
 
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
 

Último

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Secure Computing Magazine - SC World Congress 2/7 eConference - Keynote: Securing the cloud

  • 1. Keynote address: Securing the cloudJuly 28, 2011 Phil Agcaoili Cloud Security Alliance, Co-founding member CSA Cloud Controls Matrix (CCM), Inventor and co-author CSA GRC Stack , Co-founder and committee co-chair CSA Atlanta Chapter, Founder and Chapter Officer
  • 2. 2 Customers of Cloud Enterprises – large scale services Outsource whole-sale IT services such as payroll, HR/benefits, CRM, help desk/service desk, etc. Startups — developers using Web at scale Web-based business, SaaS, collaboration services, widget providers, mobile services, and social networking Small businesses — using SaaS Online businesses, online presence, collaboration, and enterprise integration Enterprises — developers and one-off projects R&D projects, quick promotions, widgets, online collaboration, partner integration, social networking, and new business ventures Firms — with compute intensive tasks Overnight ad placement or transportation calculations “If you move your data centre to a cloud provider, it will cost a tenth of the cost.” – Brian Gammage, Gartner Fellow “Using cloud infrastructures saves 18% to 29% before considering that you no longer need to buy for peak capacity” - George Reese, founder Valtira and enStratus “Web service providers offer APIs that enable developers to exploit functionality over the Internet, rather than delivering full-blown applications.” - Infoworld
  • 3. 3 “In the Cloud, step one is trusting, and that's not security — that's hope.” - Andrew Walls, Gartner Group You cannot outsource responsibility.
  • 4. 4 Top Threats of Cloud Computing CSA Research Study Findings: Shared Technology Vulnerabilities Data Loss/Data Leakage Malicious Insiders Interception or Hijacking of Traffic Insecure APIs Account/Service Hijacking Nefarious Use of Service HTTP://CLOUDSECURITYALLIANCE.ORG/TOPTHREATS
  • 5. 5 Cloud Security = Loss of Control Loss of Direct access - In the Cloud you are at least one step removed Multi-tenancy – not an issue in private computing, no shared devices or services Commingling – will your data be mixed in with other clients? How will it be segregated? Resource Pooling – how will resource conflicts be resolved? Who gets first response? Ineffective data deletion – if you change providers does your data get destroyed? Unintentional destruction? Legal snafus/data exhaust – if Company A has their data subpoenaed and your data is also on the same device, what happens to your data? Traditional Security ModelNew Security Model
  • 6. 6 Moving to the Cloud Assess the business Assess the culture Assess the value Understand your data Understand your services Understand your processes Understand the cloud resources Identify candidate data Identify candidate services Identify candidate processes Create a governance strategy Bind candidate services to data and processes Relocate services, processes, and information Implement security Implement governance Implement operations Create a security strategy
  • 7. 7 Secure Adoption of the Cloud Understand the threats and the risks CSA Guidance Identify the asset for the cloud deployment Evaluate the asset Map the asset to potential cloud deployment models Evaluate potential cloud service models and providers Sketch the potential data flow https://wiki.cloudsecurityalliance.org/guidance Mitigating the risks Legal contracts and SLAs with Cloud Service Providers (CSPs) CSA Atlanta Chapter Project 2 – Contractual Guidance (coming soon) Audits, Attestations, and Certifications for Cloud Trust and Assurance ISO 27001 Certification Amazon ISO 27001 SAS 70 Type II FISMA moderate Authority to Operate HIPAA - Current customer deployments Whitepaper describes the specifics http://aws.amazon.com/security AICPA SSAE 16 (SOC 1, 2, and 3) / ISAE 3402 Replaced SAS 70 as of June 2011 CSA STAR (coming soon) and CSA GRC Stack standards usage Microsoft Office 365 (formerly BPOS) ISO27K to CSA CCM Mapping http://www.microsoft.com/download/en/details.aspx?id=26647 CloudAudit Cloud Controls Matrix (CCM) Consensus Assessments Initiative Questionnaire (CAIQ) Cloud Trust Protocol (CTP)
  • 8. CSA Governance, Risk, and Compliance (CSA GRC) Stack Provider Assertions Suite of tools, best practices and enabling technology Consolidate industry research & simplify GRC in the cloud For cloud providers, enterprises, solution providers and audit/compliance Controls Framework, Questionnaire and Continuous Controls Monitoring Automation Simplifies customer and cloud provider attestation to accelerate cloud adoption https://cloudsecurityalliance.org/grc-stack Private & Public Clouds Control Requirements
  • 9.
  • 10. ISO/IEC JTC 1 SC 27 (“SC 27”) WG 1, 4 and 5 in Study Period in the area of Cloud Computing Security and Privacy
  • 11. European Network and Information Security Agency (ENISA)
  • 13. American Institute of Certified Public Accountants (AICPA)
  • 14. Statement on Standards for Attestation Engagements (SSAE) No. 16 SOC 2 – Service Organization Controls over Security, Confidentiality, Processing Integrity, Availability, and Privacy
  • 15. Next generation SAS 70 Type I and II attestation
  • 16. National Institute of Standards and Technology (NIST)
  • 17. Consolidated feedback on Federal Risk and Authorization Management Program (FedRAMP)
  • 21. Health Information Trust Alliance (HITRUST)
  • 22. Information Systems Audit and Control Association (ISACA) COBIT
  • 23. BITS Shared Assessments SIG/AUP + TG Participation
  • 24.
  • 25. The CSA Atlanta Chapter Project and Its Value Fill the CAIQ out so that it addresses effectively all general legal and risk management issues (i.e., issues not limited to a specific business sector or region) that should arise in the due diligence process. Provide for supporting narrative complementing the yes/no answers to all questions. The value to vendors is that they can write only once (and then update) a single, comprehensive set of answers to due diligence questions. Prospective customers can use the yes/no answers to make instantaneous vendor comparisons, and then drill deeper into the related narratives.
  • 26. 12 Legal and Contract Issues with Cloud “Many cloud providers appear reluctant to negotiate contracts, as the premise of their core model is a highly leveraged approach. The starting point contractually often favors the vendor, resulting in a potential misalignment with user requirements.” Gartner 9 Security Areas to Include in CSP-related Contract: Security Data privacy conditions Uptime guarantees Service-level agreement (SLA) penalties SLA penalty exclusions Business continuity and disaster recovery Suspension of service Termination Liability
  • 27. philA’s Approach to Using the CSA GRC Stack Pre-sales - Use CAI Questionnaire Contracts (MSA) – Attach CAIQ + CCM Post Sales Assurance and Continuous Compliance – Use CloudAudit to verify contract and pre-sales assertions *CSA STAR will support this approach in an official manner.
  • 28. 14 Cloud Back Out Plan Considerations Include provisions for transition assistance requiring the vendor to assist you with transition to a new vendor. Require the return or secure destruction of all data held by vendor. Have right to verify compliance. Transition period may last from 30 days to 6 months.
  • 29. 15 Summary Adopt Cloud that works for you Understand the risks Know your limits Conduct due diligence Use available Cloud Trust and Assurance tools Work with your Legal and Procurement teams to ensure contractual obligations exist and are met
  • 30. 16 About the Cloud Security Alliance Global, not-for-profit organization Over 22,000 individual members, 100 corporate members Building good practices and a trusted cloud ecosystem Agile philosophy, rapid development of applied research GRC: Balance compliance with risk management Reference models: build using existing standards Identity: a key foundation of a functioning cloud economy Champion interoperability Advocacy of prudent public policy “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.”
  • 31. 17 Questions and Answers… HTTP://CLOUDSECURITYALLIANCE.ORGhttp://cloudsecurityalliance.org/cmhttp://cloudsecurityalliance.org/grc-stackhttps://wiki.cloudsecurityalliance.org/guidancehttp://cloudsecurityalliance.org/topthreatshttp://AICPA.ORG/SOC/http://www.opencloudmanifesto.org http://www.opengroup.org/jericho http://www.nist.gov/itl/cloud/index.cfm http://www.microsoft.com/download/en/details.aspx?id=26647http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment CSA LinkedIn: www.linkedin.com/groups?gid=1864210 Many thanks to: Jon Neiditz, Nelson Mullins Riley & Scarborough, for leading the development of the CSA Atlanta Chapter Project 2 (Contractual Guidance) and for some of the material used in today’s presentation. David Barton, UHY LLP, for some of the material used in today’s presentation. Phil Agcaoili Twitter: hacksec