SlideShare uma empresa Scribd logo
1 de 27
Cloud Security
For financial sector
Moshe Ferber,
CCSK, CCSP
Onlinecloudsec.com
When the winds of change blow, some people
build walls and others build windmills.
- Chinese Proverb
#whoami
 Information security professional for over 20 years
 Founder, partner and investor at various cyber initiatives and startups
 Popular industry speaker & lecturer (DefCon, BlackHat, Infosec and more)
 Founding committee member for ISC2 CCSP certification.
 CCSK Certification lecturer for the Cloud Security Alliance.
 Member of the board at Macshava Tova – Narrowing societal gaps
 Chairman of the Board, Cloud Security Alliance, Israeli Chapter
About the Cloud Security Alliance
 Global, not-for-profit organization
 Building security best practices for next generation IT
 Research and Educational Programs
 Cloud providers & security professionals Certifications
 Awareness and Marketing
 The globally authoritative source for Trust in the Cloud
“To promote the use of best practices for providing security assurance
within Cloud Computing, and provide education on the uses of Cloud
Computing to help secure all other forms of computing”
CSA Israel:
Community of
security
professional
promoting
responsible
cloud adoption.
Cloud Computing
What the CIO think
about it?
How the CFO
see it?
How the End-User
feel regarding it?
And how the CISO
treat it?
Everyday Examples
“Moving to cloud will
expose our data to foreign
government”
“I got a virtualized
servers, so I already in the
cloud”
“I don’t trust the vendors”
“What about compliance?”
“Our regulator forbid
us from moving to the
cloud”
“Cloud lacks the visibility
we need”
“We use hosting, so
we are already in the
cloud.”
“We will loose control
over our assets”
“And What about the
NSA…?” “Cloud services are
not mature enough”
Cloud Services are very different in nature
SaaS
PaaS
IaaS
Private Hybrid Public
The shared responsibility model
Physical Security
Network & Data Center
Security
Hypervisors Security
Virtual Machines & OS
security
Data layer & development
platform
Application
Identity Management
DATA
Audit & Monitoring
IaaS PaaS SaaS
Consumer
responsibility
Provider
responsibility
Cloud
Focused
(Heavy use)
Cloud
Adopters
(2-3 apps in the cloud)
Cloud
Curious
(First projects)
Private
Cloud
(public Cloud avoiders)
National
Infrastructure
Cloud challenges varies depending on the market sector
Startups
Energy
SMB
Hi Tech
Government
Health
Military
Telecom
providers
Homeland &
Military industries
Utility
Retail
BanksFinancial
Services
Industry
The CISO Challenge
How to build secure
application
How to correctly
evaluate your provider
IaaS/PaaS SaaS
Step 1: Build your cloud security policy
Building a cloud strategy
Guidelines for
which
data/app can
migrate
Threats &
Risks to
consider
Evaluating
the provider
maturity and
operational
procedures.
Additional
controls that
should be
implemented
in the service.
Cloud Policy: what should move to cloud?
Public
Cloud
Integrity Availability
On
premise
Confidentiality
• Data exposed to public
• Applications that are currently neglected
• Test/Dev environments
• Mobile App backend
• Hardware/infrastructure intensive
application
Focus on how & where to move
Analyze the application
Identity
• Who are the
identities.
Number &
nature
Interfaces
• Are there
interfaces to
the
organization?
Data
• Laws &
regulations
• Sensitivity
level
Dealing with threats/risks
The most common threats
Data
breaches
Government
warrant
Malicious
insider
Unintentional
disclosure
Hacking
Account
hijacking
Loss of data
Unexpected
expanses
C, I, A
Reputation
Loss of
availability
Provider
outbreak
Communication
outbreak
Account
lockout/ Lock in
DDOS
Attack vectors
Cloud
Attack
Vectors
Provider
Administration
Management
Console
Multi tenancy &
Virtualization
Automation
& API
Chain of
supply
Side Channel
Attack
Insecure
Instances
The Challenge: Evaluating the providers
The Challenge: Evaluating the providers
• Could you do an audit?
• Should you do an audit?
In many cases you have to settle for 3rd party
attestation.
Compliance with BOI regulation
Encryption
• Encrypting data
at the cloud
provider (who
has the keys)?
Identity
Management
• Who control the
user store?
• Who is
responsible for
authentication?
Governance &
Audit
• Who does
what?
• Suspicious
events
detection
CASB - Cloud Access Security Brokers
Challenges - encryption
Data at motion:
• Usually users traffic is
encrypted. But what about
machine2machine interfaces?
Data at rest:
• Different encryption for
different purposes.
• Who got the key?
Storage encryption
OS Volume encryption
DB encryption (TDE)
File & Application level
Challenges – encryption (cont)
How to build in encryption
with your keys
Use of encryption
gateways
IaaS/PaaS SaaS
Challenges – identity management
Service
providerBank AD
• Identity federation is key
technology for controlling
user identities and
authentication.
• Federation is about use-
cases. Each use-case got
a matching federation
technology.
Challenges – Governance & Audit
Who does what?
Where my users
login from?
Who got public
files?
Who got credit
cards number in
their files
What kind of
cloud services
my users deploy?
Additional Challenges – portability
• In the cloud, sometimes the best control is to make
sure you are able to pack your data and go.
Questions?
To wrap Things Up
Join CSA Israel Facebook &
LinkedIn Forums in order
to stay updated regarding
latest technologies and
community meetups.
 Cloud can present an opportunity for the CISO.
 Trust your providers wisely. Make sure you are
monitoring them carefully and be prepare to move if
needed.
 Adopt different policies for IaaS / PaaS / SaaS
KEEP IN TOUCH
Cloud Security Course Schedule can be find at:
http://www.onlinecloudsec.com/course-schedule

Mais conteúdo relacionado

Mais procurados

2012 10 cloud security architecture
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architecture
Vladimir Jirasek
 
Secaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidanceSecaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidance
drewz lin
 

Mais procurados (19)

Cloud security what to expect (introduction to cloud security)
Cloud security   what to expect (introduction to cloud security)Cloud security   what to expect (introduction to cloud security)
Cloud security what to expect (introduction to cloud security)
 
Cloud keybank privacy and owner authorization
Cloud keybank  privacy and owner authorizationCloud keybank  privacy and owner authorization
Cloud keybank privacy and owner authorization
 
Architect secure cloud services.
Architect secure cloud services.Architect secure cloud services.
Architect secure cloud services.
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
Cloud risk and business continuity v21
Cloud risk and business continuity v21Cloud risk and business continuity v21
Cloud risk and business continuity v21
 
Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Cloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption ExplainedCloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption Explained
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security Demystified
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
 
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption? CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
 
2012 10 cloud security architecture
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architecture
 
Cloud security privacy- org
Cloud security  privacy- orgCloud security  privacy- org
Cloud security privacy- org
 
Secaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidanceSecaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidance
 
IT Security As A Service
IT Security As A ServiceIT Security As A Service
IT Security As A Service
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud Environment
 

Destaque

Destaque (9)

Jeopardy Game
Jeopardy Game Jeopardy Game
Jeopardy Game
 
Ws presentation
Ws presentationWs presentation
Ws presentation
 
Political Aspects of Unemployment: Brazil's Neoliberal U-Turn
Political Aspects of Unemployment: Brazil's Neoliberal U-TurnPolitical Aspects of Unemployment: Brazil's Neoliberal U-Turn
Political Aspects of Unemployment: Brazil's Neoliberal U-Turn
 
Decomposing the Growth of Portugal: A Case for Increasing Demand, not austeri...
Decomposing the Growth of Portugal: A Case for Increasing Demand, not austeri...Decomposing the Growth of Portugal: A Case for Increasing Demand, not austeri...
Decomposing the Growth of Portugal: A Case for Increasing Demand, not austeri...
 
Security in Semantic Web Services
Security in Semantic Web ServicesSecurity in Semantic Web Services
Security in Semantic Web Services
 
Letter of Credit (LC) Presentation
Letter of Credit (LC) PresentationLetter of Credit (LC) Presentation
Letter of Credit (LC) Presentation
 
Coponential analysis
Coponential analysisCoponential analysis
Coponential analysis
 
Indian Banking Sector
Indian Banking SectorIndian Banking Sector
Indian Banking Sector
 
Banking ppt
Banking pptBanking ppt
Banking ppt
 

Semelhante a Cloud security for banks - the central bank of Israel regulations for cloud security

Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
Kashyap Kunal
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
patmisasi
 

Semelhante a Cloud security for banks - the central bank of Israel regulations for cloud security (20)

Cloud security for financial services
Cloud security for financial servicesCloud security for financial services
Cloud security for financial services
 
Why 2024 will become the Year of SaaS Security Meetup 24012024.pptx
Why 2024 will become the Year of SaaS Security Meetup 24012024.pptxWhy 2024 will become the Year of SaaS Security Meetup 24012024.pptx
Why 2024 will become the Year of SaaS Security Meetup 24012024.pptx
 
Fundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfFundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdf
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
Whose Cloud is It Anyway - Data Security in the Cloud
Whose Cloud is It Anyway - Data Security in the CloudWhose Cloud is It Anyway - Data Security in the Cloud
Whose Cloud is It Anyway - Data Security in the Cloud
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptx
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptx
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
 
Hogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing SecutityHogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing Secutity
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
Presd1 10
Presd1 10Presd1 10
Presd1 10
 
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
 
The security of SAAS and private cloud
The security of SAAS and private cloudThe security of SAAS and private cloud
The security of SAAS and private cloud
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Cloud security for banks - the central bank of Israel regulations for cloud security

  • 1. Cloud Security For financial sector Moshe Ferber, CCSK, CCSP Onlinecloudsec.com When the winds of change blow, some people build walls and others build windmills. - Chinese Proverb
  • 2. #whoami  Information security professional for over 20 years  Founder, partner and investor at various cyber initiatives and startups  Popular industry speaker & lecturer (DefCon, BlackHat, Infosec and more)  Founding committee member for ISC2 CCSP certification.  CCSK Certification lecturer for the Cloud Security Alliance.  Member of the board at Macshava Tova – Narrowing societal gaps  Chairman of the Board, Cloud Security Alliance, Israeli Chapter
  • 3. About the Cloud Security Alliance  Global, not-for-profit organization  Building security best practices for next generation IT  Research and Educational Programs  Cloud providers & security professionals Certifications  Awareness and Marketing  The globally authoritative source for Trust in the Cloud “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing” CSA Israel: Community of security professional promoting responsible cloud adoption.
  • 4. Cloud Computing What the CIO think about it? How the CFO see it? How the End-User feel regarding it? And how the CISO treat it?
  • 5. Everyday Examples “Moving to cloud will expose our data to foreign government” “I got a virtualized servers, so I already in the cloud” “I don’t trust the vendors” “What about compliance?” “Our regulator forbid us from moving to the cloud” “Cloud lacks the visibility we need” “We use hosting, so we are already in the cloud.” “We will loose control over our assets” “And What about the NSA…?” “Cloud services are not mature enough”
  • 6. Cloud Services are very different in nature SaaS PaaS IaaS Private Hybrid Public
  • 7. The shared responsibility model Physical Security Network & Data Center Security Hypervisors Security Virtual Machines & OS security Data layer & development platform Application Identity Management DATA Audit & Monitoring IaaS PaaS SaaS Consumer responsibility Provider responsibility
  • 8. Cloud Focused (Heavy use) Cloud Adopters (2-3 apps in the cloud) Cloud Curious (First projects) Private Cloud (public Cloud avoiders) National Infrastructure Cloud challenges varies depending on the market sector Startups Energy SMB Hi Tech Government Health Military Telecom providers Homeland & Military industries Utility Retail BanksFinancial Services Industry
  • 9. The CISO Challenge How to build secure application How to correctly evaluate your provider IaaS/PaaS SaaS
  • 10. Step 1: Build your cloud security policy
  • 11. Building a cloud strategy Guidelines for which data/app can migrate Threats & Risks to consider Evaluating the provider maturity and operational procedures. Additional controls that should be implemented in the service.
  • 12. Cloud Policy: what should move to cloud? Public Cloud Integrity Availability On premise Confidentiality • Data exposed to public • Applications that are currently neglected • Test/Dev environments • Mobile App backend • Hardware/infrastructure intensive application Focus on how & where to move
  • 13. Analyze the application Identity • Who are the identities. Number & nature Interfaces • Are there interfaces to the organization? Data • Laws & regulations • Sensitivity level
  • 15. The most common threats Data breaches Government warrant Malicious insider Unintentional disclosure Hacking Account hijacking Loss of data Unexpected expanses C, I, A Reputation Loss of availability Provider outbreak Communication outbreak Account lockout/ Lock in DDOS
  • 16. Attack vectors Cloud Attack Vectors Provider Administration Management Console Multi tenancy & Virtualization Automation & API Chain of supply Side Channel Attack Insecure Instances
  • 17. The Challenge: Evaluating the providers
  • 18. The Challenge: Evaluating the providers • Could you do an audit? • Should you do an audit? In many cases you have to settle for 3rd party attestation.
  • 19. Compliance with BOI regulation Encryption • Encrypting data at the cloud provider (who has the keys)? Identity Management • Who control the user store? • Who is responsible for authentication? Governance & Audit • Who does what? • Suspicious events detection CASB - Cloud Access Security Brokers
  • 20. Challenges - encryption Data at motion: • Usually users traffic is encrypted. But what about machine2machine interfaces? Data at rest: • Different encryption for different purposes. • Who got the key? Storage encryption OS Volume encryption DB encryption (TDE) File & Application level
  • 21. Challenges – encryption (cont) How to build in encryption with your keys Use of encryption gateways IaaS/PaaS SaaS
  • 22. Challenges – identity management Service providerBank AD • Identity federation is key technology for controlling user identities and authentication. • Federation is about use- cases. Each use-case got a matching federation technology.
  • 23. Challenges – Governance & Audit Who does what? Where my users login from? Who got public files? Who got credit cards number in their files What kind of cloud services my users deploy?
  • 24. Additional Challenges – portability • In the cloud, sometimes the best control is to make sure you are able to pack your data and go.
  • 26. To wrap Things Up Join CSA Israel Facebook & LinkedIn Forums in order to stay updated regarding latest technologies and community meetups.  Cloud can present an opportunity for the CISO.  Trust your providers wisely. Make sure you are monitoring them carefully and be prepare to move if needed.  Adopt different policies for IaaS / PaaS / SaaS
  • 27. KEEP IN TOUCH Cloud Security Course Schedule can be find at: http://www.onlinecloudsec.com/course-schedule