SlideShare uma empresa Scribd logo
1 de 37
Cloud and Privacy regulations
Ran Adler, VP consulting services, 2Bsecure
Our Goal…
Lecture Agenda
• Is cloud is a real danger?
• If I was the regulator what would I do?
• Understanding regulations types
• GDPR and the new Israeli’s privacy rules
• BOI and the Insurance Supervision regulations in Israel
• ISO and PCI DSS
Is cloud is a real danger?
• Yes!!
• Someone else can see your staff…
• Subpoenas…
• Who run’s the encryption keys?
• Multi tenancy risks
• Lack of transparency
• And many more…
So why bother?
Or why should regulators even consider of
allowing the usage of cloud services?
- Because cloud can be cheaper
- Because by allowing cloud - encourages competition
- Because allowing cloud is allowing progress
- Because cloud can be much more secure
Why?
Examples for cloud security advantages:
• If you need a stable and redundant application for your
customers.
• IfYou want to make sure that all patches and updates are
well implemented (SAAS and PAAS)
• If you want an advanced monitoring capabilities.
• If you need a fast and effective implementation of security
tools into your (cloud) environment.
AWS- build in security features/ capabilities
• AmazonVPC+ security groups and ACL’s
• DDOS- CloudFront and Route 53
• Multi Factor Authentication- AWS- MFA
• IAM and Federation services-AWS IAM and AWS directory
services
• Built in Encryption capabilities- EBS, S3, Glacier and more
• Keys management-AWS KMS and Cloud HSM
• APIVisibility-AWS CloudTrail
• Security Alerts- AWS CloudWatch
Regulation types
• Standards
• Laws/ Regulations
• Framework
Laws- Regulations
Privacy Protection Authority- FKA- Ramot
• The Privacy authority in Israel. From now on – PPA…
• It has the authority under the “Protection of Privacy” Law
• One of the most prominent issues from the privacy law Perspective is:
“are we allowed to store/ process private information:
• Outside our organization- Outsourcing
• Outside of the country?”
The common practice of using one of the international cloud providers
services contains it both…
PPA- Outsourcing rules
• PPA has published, few years ago, the following directive:
“‫בשירותי‬ ‫שימוש‬OutSourcing‫אישי‬ ‫מידע‬ ‫לעיבוד‬"
• In a footnote they wrote that they are about to publish a
dedicated cloud regulation. We are still waiting…
• The principles of the rule are based on risk
management approach, such as:
• Check the cloud service provider background,
experience
• Take into consideration the ability of the cloud
service provider to access the information
• The legal agreement should contain the follows:
• Information security and privacy issues
• The ability to fully erase the content of data
• The ability to carry out audits
PPA- Outsourcing rules
http://ec.europa.eu/justice/data-
protection/international-
transfers/adequacy/index_en.htm
SO – who are these countries?
Who is missing?Why?
Safe harbor
• Safe Harbour Privacy Principles were developed between
1998 and 2000 in order to prevent private organizations
within the United States which store customer data from
accidentally disclosing or losing personal information.
• However, after a customer complained that
his Facebook data were insufficiently protected, the ECJ
declared in October 2015 that the Safe Harbour Decision
was invalid,
• The European Commission and the United States agreed to
establish a new framework for transatlantic data flows on
2nd February 2016, known as the Privacy Shield".
Indeed – PPA response came right after
Privacy shield
• The Privacy Shield Frameworks were designed by the U.S. Department of
Commerce, and the European Commission, to provide companies on
both sides of the Atlantic with a mechanism to comply with data
protection requirements when transferring personal data from the
European Union to the United States.
• The Privacy Shield program, is administered by the InternationalTrade
Administration (ITA) within the U.S. Department of Commerce
• To join either Privacy Shield Framework, a U.S.-based organization will
be required to self-certify to the Department of Commerce and publicly
commit to comply with the Framework’s requirements.
• While joining the Privacy Shield is voluntary, once an eligible
organization makes the public commitment to comply with the
Framework’s requirements, the commitment will become enforceable
under U.S. law
Privacy shield
What about Proxy services?
http://www.justice.gov.il/Units/ilita/subjects/HaganatHapratiyut
/MeidaMerasham/Pages/DataTranfer.aspx
Israeli privacy new rules
• Announced earlier this year
• Going to be mandatory from the beginning of 2018
• There is no direct reference to cloud, but, like many other
regulations – it refers cloud as an outsourcing case:
GDPR- General
• IncreasedTerritorial Scope- extra-territorial applicability
• Penalties- organizations in breach of GDPR can be fined up to 4% of annual global turnover or €20 Million
(whichever is greater)
• Breach Notification- 72-hour notification for personal data breaches
• Right to Access-whether or not personal data concerning an individual is being processed, where and for
what purpose
• Right to be Forgotten -Data Erasure
• Privacy by Design
• Data Protection Officers (DPO)
• Data processing agreement (DPA) – an organization may need a DPA that will meet the requirements of
the GDPR, particularly if personal data is transferred outside the European EconomicArea.
GDPR- some steps towards compliance
• Know the location where cloud apps are processing or storing data.
• Take adequate security measures to protect personal data from
loss, alteration, or unauthorized processing..
• Close a data processing agreement (DPA) with the cloud apps
you’re using.
• Collect only “necessary” data and limit the processing of “special”
data.
• Don’t allow cloud apps to use personal data for other purposes.
• Ensure that you can erase the data when you stop using the app. .
GDPR- AWS
• General declaration:
• https://aws.amazon.com/compliance/eu-data-protection/
BOI- regulations
BOI- regulations
Insurance supervision regulation
YAHAV
YAHAV
Standards
ISO- 27017, 27018
• 27017-This standard provides guidance on the information
security aspects of cloud computing, recommending and
assisting with the implementation of cloud-specific
information security controls .
• 27018-This standard provides guidance aimed at ensuring
that cloud service providers (such as Amazon and Google)
offer suitable information security controls to protect the
privacy of their customers’ clients by securing PII (Personally
Identifiable Information) entrusted to them.
PCI DSS and Cloud
• PCI Council has published a unique manual to assist
merchants who uses cloud services to comply with PCI DSS
• “PCI DSS Cloud Computing Guidelines”
PCI DSS and Cloud
TOHAG
• TOHAG is the new Israeli Cyber Authority Cyber seucity
framework
• I refers to cloud in section 11.
• We think it is going to take a central place in future
assessments by entities
Thank you!

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

cloud computing Multi cloud
cloud computing Multi cloudcloud computing Multi cloud
cloud computing Multi cloud
 
Multi cloud strategy
Multi cloud strategyMulti cloud strategy
Multi cloud strategy
 
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
 
How hybrid/multi-cloud governance platform benefits your cloud strategy
How hybrid/multi-cloud governance platform benefits your cloud strategy How hybrid/multi-cloud governance platform benefits your cloud strategy
How hybrid/multi-cloud governance platform benefits your cloud strategy
 
Impact of gdpr on cloud computing
Impact of gdpr on cloud computingImpact of gdpr on cloud computing
Impact of gdpr on cloud computing
 
Multi-cloud strategies and services
Multi-cloud strategies and servicesMulti-cloud strategies and services
Multi-cloud strategies and services
 
Teodor's Accreditation
Teodor's AccreditationTeodor's Accreditation
Teodor's Accreditation
 
Welcome to the Multi-cloud world
Welcome to the Multi-cloud worldWelcome to the Multi-cloud world
Welcome to the Multi-cloud world
 
#UNIT 2017: Cloud Computing
#UNIT 2017: Cloud Computing#UNIT 2017: Cloud Computing
#UNIT 2017: Cloud Computing
 
Hashicorp Corporate Pitch Deck Stenio_v2
Hashicorp Corporate Pitch Deck Stenio_v2 Hashicorp Corporate Pitch Deck Stenio_v2
Hashicorp Corporate Pitch Deck Stenio_v2
 
 5 security risks of cloud computing
 5 security risks of cloud computing 5 security risks of cloud computing
 5 security risks of cloud computing
 
Enabling Compliance with GDPR on AWS
Enabling Compliance with GDPR on AWSEnabling Compliance with GDPR on AWS
Enabling Compliance with GDPR on AWS
 
Providing Insight, Protection, and Resiliency to Cloud Environments
Providing Insight, Protection, and Resiliency to Cloud EnvironmentsProviding Insight, Protection, and Resiliency to Cloud Environments
Providing Insight, Protection, and Resiliency to Cloud Environments
 
Adopting Multi-Cloud Services with Confidence
Adopting Multi-Cloud Services with ConfidenceAdopting Multi-Cloud Services with Confidence
Adopting Multi-Cloud Services with Confidence
 
IBM Cloud Pak for Data Improves Cataloging Technologies for Enterprise
IBM Cloud Pak for Data Improves Cataloging Technologies for EnterpriseIBM Cloud Pak for Data Improves Cataloging Technologies for Enterprise
IBM Cloud Pak for Data Improves Cataloging Technologies for Enterprise
 
Corestack Multi-Cloud Management
Corestack Multi-Cloud ManagementCorestack Multi-Cloud Management
Corestack Multi-Cloud Management
 
Cloud computing a comparative study
Cloud computing   a comparative studyCloud computing   a comparative study
Cloud computing a comparative study
 
A journey to faster, repeatable data commercialization
A journey to faster, repeatable data commercializationA journey to faster, repeatable data commercialization
A journey to faster, repeatable data commercialization
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
AWS FSI Symposium 2017 NYC- Shared Reponsibility & AWS Compliance
AWS FSI Symposium 2017 NYC- Shared Reponsibility & AWS ComplianceAWS FSI Symposium 2017 NYC- Shared Reponsibility & AWS Compliance
AWS FSI Symposium 2017 NYC- Shared Reponsibility & AWS Compliance
 

Semelhante a Introdction to Cloud Regulation for Enterprise by 2Bsecure

Semelhante a Introdction to Cloud Regulation for Enterprise by 2Bsecure (20)

Cloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran AdlerCloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran Adler
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failing
 
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the Cloud
 
Enabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSEnabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWS
 
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptx
 
GDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best PracticesGDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best Practices
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
 
The Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud ServicesThe Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud Services
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
 
GDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EUGDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EU
 
Clouds and Chains
Clouds and ChainsClouds and Chains
Clouds and Chains
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
 
AWS Shared Responsibility Model and GDPR
AWS Shared Responsibility Model and GDPRAWS Shared Responsibility Model and GDPR
AWS Shared Responsibility Model and GDPR
 
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday Project
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday ProjectCanadian Cloud Webcast from CTE Solutions part of Smarter Everyday Project
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday Project
 
Cloud Computing Legal Risks And Best Practices
Cloud Computing Legal Risks And Best PracticesCloud Computing Legal Risks And Best Practices
Cloud Computing Legal Risks And Best Practices
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
 

Mais de Idan Tohami

Mais de Idan Tohami (20)

Simplify Your Security with Cybowall
Simplify Your Security with CybowallSimplify Your Security with Cybowall
Simplify Your Security with Cybowall
 
AML Transaction Monitoring Tuning Webinar
AML Transaction Monitoring Tuning WebinarAML Transaction Monitoring Tuning Webinar
AML Transaction Monitoring Tuning Webinar
 
Robotic Process Automation (RPA) Webinar - By Matrix-IFS
Robotic Process Automation (RPA) Webinar - By Matrix-IFSRobotic Process Automation (RPA) Webinar - By Matrix-IFS
Robotic Process Automation (RPA) Webinar - By Matrix-IFS
 
Open Banking / PSD2 & GDPR Regulations and How They Are Changing Fraud & Fina...
Open Banking / PSD2 & GDPR Regulations and How They Are Changing Fraud & Fina...Open Banking / PSD2 & GDPR Regulations and How They Are Changing Fraud & Fina...
Open Banking / PSD2 & GDPR Regulations and How They Are Changing Fraud & Fina...
 
Robotic Automation Process (RPA) Webinar - By Matrix-IFS
Robotic Automation Process (RPA) Webinar - By Matrix-IFSRobotic Automation Process (RPA) Webinar - By Matrix-IFS
Robotic Automation Process (RPA) Webinar - By Matrix-IFS
 
Robotic Automation Process (RPA) Brochure - By Matrix-IFS
Robotic Automation Process (RPA) Brochure - By Matrix-IFSRobotic Automation Process (RPA) Brochure - By Matrix-IFS
Robotic Automation Process (RPA) Brochure - By Matrix-IFS
 
Enterprise Journey to the Cloud - Opening Remarks
Enterprise Journey to the Cloud  - Opening RemarksEnterprise Journey to the Cloud  - Opening Remarks
Enterprise Journey to the Cloud - Opening Remarks
 
Vmware on aws
Vmware on awsVmware on aws
Vmware on aws
 
Ready.Set.Cloud - Enterprise Cloud Migration Framework
Ready.Set.Cloud - Enterprise Cloud Migration FrameworkReady.Set.Cloud - Enterprise Cloud Migration Framework
Ready.Set.Cloud - Enterprise Cloud Migration Framework
 
Google Cloud Fundamentals by CloudZone
Google Cloud Fundamentals by CloudZoneGoogle Cloud Fundamentals by CloudZone
Google Cloud Fundamentals by CloudZone
 
HDinsight Workshop - Prerequisite Activity
HDinsight Workshop - Prerequisite ActivityHDinsight Workshop - Prerequisite Activity
HDinsight Workshop - Prerequisite Activity
 
Azure Logic Apps by Gil Gross, CloudZone
Azure Logic Apps by Gil Gross, CloudZoneAzure Logic Apps by Gil Gross, CloudZone
Azure Logic Apps by Gil Gross, CloudZone
 
AWS Fundamentals @Back2School by CloudZone
AWS Fundamentals @Back2School by CloudZoneAWS Fundamentals @Back2School by CloudZone
AWS Fundamentals @Back2School by CloudZone
 
Cloud Accelerated Genomics
Cloud Accelerated GenomicsCloud Accelerated Genomics
Cloud Accelerated Genomics
 
Achieving HIPAA on GCP
Achieving HIPAA on GCPAchieving HIPAA on GCP
Achieving HIPAA on GCP
 
Couchbase Day
Couchbase DayCouchbase Day
Couchbase Day
 
Microsoft Azure and Couchbase
Microsoft Azure and CouchbaseMicrosoft Azure and Couchbase
Microsoft Azure and Couchbase
 
Sarine's Big Data Journey by Rostislav Aaronov
Sarine's Big Data Journey by Rostislav AaronovSarine's Big Data Journey by Rostislav Aaronov
Sarine's Big Data Journey by Rostislav Aaronov
 
About DataZone
About DataZoneAbout DataZone
About DataZone
 
What's new in Elasticsearch v5
What's new in Elasticsearch v5What's new in Elasticsearch v5
What's new in Elasticsearch v5
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Introdction to Cloud Regulation for Enterprise by 2Bsecure

  • 1. Cloud and Privacy regulations Ran Adler, VP consulting services, 2Bsecure
  • 3. Lecture Agenda • Is cloud is a real danger? • If I was the regulator what would I do? • Understanding regulations types • GDPR and the new Israeli’s privacy rules • BOI and the Insurance Supervision regulations in Israel • ISO and PCI DSS
  • 4. Is cloud is a real danger? • Yes!! • Someone else can see your staff… • Subpoenas… • Who run’s the encryption keys? • Multi tenancy risks • Lack of transparency • And many more…
  • 5. So why bother? Or why should regulators even consider of allowing the usage of cloud services?
  • 6. - Because cloud can be cheaper - Because by allowing cloud - encourages competition - Because allowing cloud is allowing progress - Because cloud can be much more secure Why?
  • 7. Examples for cloud security advantages: • If you need a stable and redundant application for your customers. • IfYou want to make sure that all patches and updates are well implemented (SAAS and PAAS) • If you want an advanced monitoring capabilities. • If you need a fast and effective implementation of security tools into your (cloud) environment.
  • 8. AWS- build in security features/ capabilities • AmazonVPC+ security groups and ACL’s • DDOS- CloudFront and Route 53 • Multi Factor Authentication- AWS- MFA • IAM and Federation services-AWS IAM and AWS directory services • Built in Encryption capabilities- EBS, S3, Glacier and more • Keys management-AWS KMS and Cloud HSM • APIVisibility-AWS CloudTrail • Security Alerts- AWS CloudWatch
  • 9. Regulation types • Standards • Laws/ Regulations • Framework
  • 11. Privacy Protection Authority- FKA- Ramot • The Privacy authority in Israel. From now on – PPA… • It has the authority under the “Protection of Privacy” Law • One of the most prominent issues from the privacy law Perspective is: “are we allowed to store/ process private information: • Outside our organization- Outsourcing • Outside of the country?” The common practice of using one of the international cloud providers services contains it both…
  • 12. PPA- Outsourcing rules • PPA has published, few years ago, the following directive: “‫בשירותי‬ ‫שימוש‬OutSourcing‫אישי‬ ‫מידע‬ ‫לעיבוד‬" • In a footnote they wrote that they are about to publish a dedicated cloud regulation. We are still waiting…
  • 13. • The principles of the rule are based on risk management approach, such as: • Check the cloud service provider background, experience • Take into consideration the ability of the cloud service provider to access the information • The legal agreement should contain the follows: • Information security and privacy issues • The ability to fully erase the content of data • The ability to carry out audits PPA- Outsourcing rules
  • 14.
  • 17. Safe harbor • Safe Harbour Privacy Principles were developed between 1998 and 2000 in order to prevent private organizations within the United States which store customer data from accidentally disclosing or losing personal information. • However, after a customer complained that his Facebook data were insufficiently protected, the ECJ declared in October 2015 that the Safe Harbour Decision was invalid, • The European Commission and the United States agreed to establish a new framework for transatlantic data flows on 2nd February 2016, known as the Privacy Shield".
  • 18. Indeed – PPA response came right after
  • 19. Privacy shield • The Privacy Shield Frameworks were designed by the U.S. Department of Commerce, and the European Commission, to provide companies on both sides of the Atlantic with a mechanism to comply with data protection requirements when transferring personal data from the European Union to the United States. • The Privacy Shield program, is administered by the InternationalTrade Administration (ITA) within the U.S. Department of Commerce • To join either Privacy Shield Framework, a U.S.-based organization will be required to self-certify to the Department of Commerce and publicly commit to comply with the Framework’s requirements. • While joining the Privacy Shield is voluntary, once an eligible organization makes the public commitment to comply with the Framework’s requirements, the commitment will become enforceable under U.S. law
  • 21. What about Proxy services? http://www.justice.gov.il/Units/ilita/subjects/HaganatHapratiyut /MeidaMerasham/Pages/DataTranfer.aspx
  • 22. Israeli privacy new rules • Announced earlier this year • Going to be mandatory from the beginning of 2018 • There is no direct reference to cloud, but, like many other regulations – it refers cloud as an outsourcing case:
  • 23. GDPR- General • IncreasedTerritorial Scope- extra-territorial applicability • Penalties- organizations in breach of GDPR can be fined up to 4% of annual global turnover or €20 Million (whichever is greater) • Breach Notification- 72-hour notification for personal data breaches • Right to Access-whether or not personal data concerning an individual is being processed, where and for what purpose • Right to be Forgotten -Data Erasure • Privacy by Design • Data Protection Officers (DPO) • Data processing agreement (DPA) – an organization may need a DPA that will meet the requirements of the GDPR, particularly if personal data is transferred outside the European EconomicArea.
  • 24. GDPR- some steps towards compliance • Know the location where cloud apps are processing or storing data. • Take adequate security measures to protect personal data from loss, alteration, or unauthorized processing.. • Close a data processing agreement (DPA) with the cloud apps you’re using. • Collect only “necessary” data and limit the processing of “special” data. • Don’t allow cloud apps to use personal data for other purposes. • Ensure that you can erase the data when you stop using the app. .
  • 25. GDPR- AWS • General declaration: • https://aws.amazon.com/compliance/eu-data-protection/
  • 29. YAHAV
  • 30. YAHAV
  • 32. ISO- 27017, 27018 • 27017-This standard provides guidance on the information security aspects of cloud computing, recommending and assisting with the implementation of cloud-specific information security controls . • 27018-This standard provides guidance aimed at ensuring that cloud service providers (such as Amazon and Google) offer suitable information security controls to protect the privacy of their customers’ clients by securing PII (Personally Identifiable Information) entrusted to them.
  • 33.
  • 34. PCI DSS and Cloud • PCI Council has published a unique manual to assist merchants who uses cloud services to comply with PCI DSS • “PCI DSS Cloud Computing Guidelines”
  • 35. PCI DSS and Cloud
  • 36. TOHAG • TOHAG is the new Israeli Cyber Authority Cyber seucity framework • I refers to cloud in section 11. • We think it is going to take a central place in future assessments by entities

Notas do Editor

  1. אני מעריך שיושבים כאן בקהל באופן גס שתי קבוצות: א. לקוחות שחושבים לעבור לענן. ממשלה, בנקים וכו' ב. חברות הייטק שנעזרות ביום יום בענן ורוצות לדעת מה כדאי להן לעשות כדי לעבוד נכון
  2. מה שבסוף מעניין את הרגולטור זה הנושא של ניהול סיכונים. הוא צריך לדאוג שהגופים עליהם מפקח נשארים יציבים
  3. הנה רצף של דוגמאות בהן אולי כדאי לעבור לענן. אני לא אומר שזה תמידי אבל בניהול הסיכונים אני מעריך שבמקרים רבים תיווצר עדיפות לענן
  4. הנה רצף של דוגמאות בהן אולי כדאי לעבור לענן. אני לא אומר שזה תמידי אבל בניהול הסיכונים אני מעריך שבמקרים רבים תיווצר עדיפות לענן
  5. הנה רצף של דוגמאות בהן אולי כדאי לעבור לענן. אני לא אומר שזה תמידי אבל בניהול הסיכונים אני מעריך שבמקרים רבים תיווצר עדיפות לענן
  6. השאלה הראשונה היא האם קיים חוק ייעודי בנושא ענן? התשובה היא לא. אלו דברים שיכולים להיגזר מתוך חוקים קיימים השימוש בשירותי ענן מכניס אותנו תחת שתי קטגוריות. הראשונה שבהן עיבוד או שמירת מידע על ידי גוף צד ג'. השניה היא שמירת המידע מחוץ לישראל
  7. וכאן נדבר על ההיבט השני- הוצאת המידע מחוץ לגבולות ישראל
  8. מי חסר לנו? ארה"ב!
  9. מי חסר לנו? ארה"ב!
  10. למעשה זה המצב החוקי שבו תקוע היום המשק הישראלי
  11. למעשה זה המצב החוקי שבו תקוע היום המשק הישראלי
  12. אין התייחסות ממוקדת לגבי ענן
  13. למעשה אלו דרישות שידרשו הרבה יותר תיעוד\ גיבוי\ יכולת התחקות לאחור\ מעקב אחר מידע וכו'
  14. הממשלה – באופן מפתיע יצאה בהכרזה כי יש לה מגמה לקדם שירותי ענן במגזרת הממשלתי