SlideShare uma empresa Scribd logo
1 de 16
Cloud Security
NJVC, LLC Proprietary Data. Do Not Distribute
 NJVC® is an IT contractor supporting the Intelligence
Community and Department of Defense (DoD), and
specializes in providing IT solutions to customers with highly
secure requirements.
 NJVC has designed/implemented/maintained multiple data
centers for an IC agency for more than a decade, including
modernizing the data center environment from a legacy
stove-piped set of physical servers to a modernized cloud
architecture with a managed service framework.
 NJVC has hosted/migrated/transitioned more than 300
distinct mission systems or production entities over the past
five years. This continued work within the area of transition
systems between data center environments has provided
NJVC unique experience, and allowed us to establish a
proven, standard, scalable process to support any system
migrating between architectures.
 Steven R. Thomas, PMP
 NJVC Director, Technical Operations
 Chief Engineer on a large program for an IC agency
 Chair of the Engineering Review Board
2
Background
NJVC, LLC Proprietary Data. Do Not Distribute
3
Cloud security is an evolving area within the larger arena of cyber security.
Refers to a broad set of policies, technologies, and controls deployed to protect
data, applications, and the associated infrastructure of cloud architectures and
cloud environments
Cloud Security
The extensive use of virtualization in
implementing cloud infrastructure
brings unique security concerns for
missions, applications, or tenants
hosted within a cloud environment.
NJVC, LLC Proprietary Data. Do Not Distribute
Strategic Framework for Cloud Security
4
Assess
Strategic Objective 1
Plan
Strategic Objective 2
Transition
Strategic Objective 3
Sustain
Strategic Objective 4
Provide a strategic framework for secure mission operations within a cloud environment
 Assess the current
security state of your
environment and each
mission system
 Understand cloud
services and what
they provide
 Understand the
security issues/risks
present in the cloud
 Assess the level of
change that you are
facing moving to the
cloud
 Gather and analyze
the security
requirements for each
mission system
against cloud services
 Draw clear lines of
responsibilities for
security within the
cloud
 Identify and document
how each mission will
use cloud services,
including security
services
 Develop a transition
plan for moving to the
cloud that includes
security
 Maintain security
posture during
transition
 Verify all data is
secure and properly
accessible
 Test and verify all
security functions,
tools, and services are
in place and
performing as
expected
 Establish a
mechanism to
periodically audit all
security services
 Monitor and report
against security
related SLAs, metrics,
and performance
measurements
 Maintain certification
and accreditation of
all systems
 Require cloud service
providers to maintain
all DoD and
FedRAMP security
requirements
Mature
Strategic Objective 7
 Establish a total
security framework
that provides
“defense in depth”
 Data consolidation
 Automation of
security
 Correlation and
aggregation of all
data
 Generates actionable
intelligence
 Real-time view of
enterprise
Ensuring the cloud is secure
As of 09 Mar 2014
NJVC, LLC Proprietary Data. Do Not Distribute
 Many of the same security risks present
in non-cloud IT deployments are still in
play.
 Several new ones are introduced.
 Greater number of entry points and
input/output paths
 A single organization, department,
user, or application can threaten the
entire cloud
 Compromise the virtualization
software or "hypervisor”
 Increase in brute force attacks
 Insider threats now include outsiders
in multi-tenant clouds
5
The Non-Secure Cloud
Just because a cloud is built inside a secure facility, operates behind a firewall,
and traverse encrypted networks doesn't mean it is secure.
Assess
Strategic Objective 1
NJVC, LLC Proprietary Data. Do Not Distribute
Transitioning from a legacy physical, distributed IT environment to a cloud
environment fundamentally changes your security threats, security exposure,
security risk, and security posture.
Understanding the shared security model is one of the biggest hurdles with securing
cloud environments.
6
Changes in Security
A vulnerable service in a cloud presents
greater exposure and risk than the same
service in a standard server farm due to the
shared nature of cloud resources.
The bank robber Willie Sutton is reputed with
replying to a reporter's inquiry as to why he
robs banks by saying:
“Because that's where the money is."
Assess
Strategic Objective 1
NJVC, LLC Proprietary Data. Do Not Distribute
Security responsibilities for a cloud architecture fall into two broad categories
1. Responsibility for the cloud architecture or cloud service provider (CSP) (providing software,
platform, or infrastructure as a service)
 CSPs generally assume the responsibility to maintain/patch the foundational services,
networks, and operating systems (OS).
2. Responsibility for the data and mission systems/applications within the cloud
 Customers and/or consumers are often responsible for securing and patching the
application and data layers.
7
Cloud Security Responsibilities
Questions you should be asking
 Is security a stated service offering(s) and if so, what does that
service(s) provide?
 Is security embedded/included with other service offerings?
 What security-related DoD policies, directives, or processes are
followed and how are they implemented?
 Can service level agreements (SLAs) be established based on security
performance measurements?
 Is security-focused monitoring and reporting offered?
Plan
Strategic Objective 2
NJVC, LLC Proprietary Data. Do Not Distribute
Proper security services and functions must be part of your planning to ensure the
security of the missions systems within the cloud.
8
Cloud Security Services
 Identity management/privacy – Ensures all sensitive data is encrypted, and
controls access to information and resources
 Physical and personnel security – Ensures physical machines are
adequately secure and access to machines and data is restricted and tracked
 Application security – Provides
testing/acceptance procedures and ensures patch
management of applications/tools
 Business continuity/data recovery – Ensures
services can be maintained in case of a disaster
and that any lost data can be recovered
 Logs/audit trails – Ensures logs and audit trails
are produced, secured, and maintained for
purposes accreditation, security audits (CCRI),
root cause analysis, or forensic investigation
Plan
Strategic Objective 2
NJVC, LLC Proprietary Data. Do Not Distribute
Moving to a cloud environment is similar to moving
from one house to another.
As such, many of the same best practices should be
applied.
 Stop hoarding and de-clutter
 Do not move unnecessary applications or
missions to the cloud—decommission them
 Do not move things that are broken or damaged
 Do not move applications that have known
security problems. Fix your CAT 1 and CAT 2
security issues
 Change your locks once you move in
 Change all the default passwords and admin
passwords provided in the cloud
9
Transitioning to the Cloud
Transition
Strategic Objective 3
NJVC, LLC Proprietary Data. Do Not Distribute
 Determine if you can bring existing security
system to your new home
 Determine if existing and proven security
systems, tools, and processes can be used
within or integrated with the cloud
 Understand the crime in your new area
 Understand the known security threats
posed by your new cloud environment
 Do not leave anything unsecure while being
moved
 Do not drop or lessen your security posture
while applications or systems are
transitioning to the cloud
 Verify everything is safe once the move is
completed
 Make sure all your data and applications
are secure and functional once the
transition to the cloud is complete 10
Transitioning to the Cloud
Transition
Strategic Objective 3
NJVC, LLC Proprietary Data. Do Not Distribute
 Detection capabilities need to be cloud-specific
and provide near real time data to consumers.
 Authentication/authorization must be robust and
integrate with DoD identity management models
(CAC, PKI, etc.).
 Security sensors need to monitor both the
interior/exterior of the cloud and send alerts to
both the CSP and mission system owners.
 Operational capabilities, such as patch
management, must be constantly maintained and
allow for agile rapid deployments.
11
Government Clouds
Cloud environments should improve overall security levels and establish an
enhanced security posture that leverages agility and technology.
Sustain
Strategic Objective 4
NJVC, LLC Proprietary Data. Do Not Distribute
Agreements must be established between the CSP and consumer, such as
contracts, SLAs, and operation support agreements.
Agreements between the CSP and customer must address a number of areas.
12
Cloud Agreements
 Ownership/privacy of data – Multiple tenants,
organizations or commands may reside in the same
cloud
 Compliance – With all appropriate DoD and federal
regulations and directives
 Performance – Establish performance levels for
uptime, access, reporting, outages, etc.
 Recovery – Applications and/or tenant data recovery
times
 Security – Define all security at each level (access,
data, database, application, infrastructure, etc.)
Sustain
Strategic Objective 4
NJVC, LLC Proprietary Data. Do Not Distribute
All organizations and departments operating within a
cloud should
 Leverage the DoD and FedRAMP processes and
approved security authorization requirements as a
baseline when initiating, reviewing, granting, and
revoking security authorizations for cloud services
 Require CSPs to meet DoD and FedRAMP
requirements via contractual provisions
 Identify and report on cloud services being used
that do not meet DoD and FedRAMP requirements
13
Cloud Certification & Accreditation
The Federal Risk and Authorization Management Program (FedRAMP) provides a
standardized approach to security assessment, authorization, and continuous monitoring for
cloud products and services.
The DoD is going beyond FedRAMP.
Computer network defense service provider will manage the security data reporting between
DoD organizations and oversight agencies, like Cyber Command and DISA.
Sustain
Strategic Objective 4
NJVC, LLC Proprietary Data. Do Not Distribute
Cloud Security Maturity
 Consolidation – Data consolidation to improve
efficiency and unify security information provided across
the cloud
 Automation – Automation of security processes,
services, and tools to require less manpower; increase
response times to threats; and improve efficiency to
provide better service
 Collaboration – Remove the barriers of data, software,
or IT architecture to facilitate correlation and aggregation
of all data feeds to support defense in depth
 Intelligence – Generates easy to understand actionable
intelligence: to spur decisions by administrators and
operators
 Visibility – Maintain real-time view of enterprise,
including all connected devices and provide continuous
monitoring to meet continuous threats
14
Target to move
here
Mature
Strategic Objective 7
Security measures and security services provided by the cloud should NEVER constitute the
totality of your security model.
Approach security from a holistic point of view with a layered security “defense in depth”
posture against cyber threats
NJVC, LLC Proprietary Data. Do Not Distribute
Government as a Platform
 Government business model changes
from isolated systems to integrated
services.
 Data ownership, service agreements,
and governance of service processes
are key issues.
 Cloud implementation requires the
most focus on information assurance
and security.
 Need exists for better integrated
security and threat sharing across the
cloud boundaries.
 Security is the worst inhibitor of cloud
integration and deployment.
Think government as a platform—big-data-accessible, mission events, and
streaming service integration to serve mission needs
NJVC, LLC Proprietary Data. Do Not Distribute
15
NJVC, LLC Proprietary Data. Do Not Distribute
www.njvc.com
16

Mais conteúdo relacionado

Mais procurados

Ariel Litvin - CCSK
Ariel Litvin - CCSKAriel Litvin - CCSK
Ariel Litvin - CCSKCSAIsrael
 
Cloud Security Guide - Ref Architecture and Gov. Model
Cloud Security Guide -  Ref Architecture and Gov. ModelCloud Security Guide -  Ref Architecture and Gov. Model
Cloud Security Guide - Ref Architecture and Gov. ModelVishal Sharma
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTINGHoang Nguyen
 
Cloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityCloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityHari Kumar
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security IssuesStelios Krasadakis
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwaribhanu krishna
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud securityRaj Sarode
 
PRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by DesignPRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by DesignPRISMACLOUD Project
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsRightScale
 
Microsoft threat protection + wdatp+ aatp overview
Microsoft threat protection + wdatp+ aatp  overviewMicrosoft threat protection + wdatp+ aatp  overview
Microsoft threat protection + wdatp+ aatp overviewAllessandra Negri
 
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEMTWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEMNexgen Technology
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfYounesChafi1
 
Cloud summit demystifying cloud security
Cloud summit   demystifying cloud securityCloud summit   demystifying cloud security
Cloud summit demystifying cloud securityDavid De Vos
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNithin Raj
 

Mais procurados (20)

Ariel Litvin - CCSK
Ariel Litvin - CCSKAriel Litvin - CCSK
Ariel Litvin - CCSK
 
Cloud Security Guide - Ref Architecture and Gov. Model
Cloud Security Guide -  Ref Architecture and Gov. ModelCloud Security Guide -  Ref Architecture and Gov. Model
Cloud Security Guide - Ref Architecture and Gov. Model
 
Cloud security and adoption
Cloud security and adoptionCloud security and adoption
Cloud security and adoption
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
 
Cloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityCloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls Security
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwari
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
PRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by DesignPRISMACLOUD Cloud Security and Privacy by Design
PRISMACLOUD Cloud Security and Privacy by Design
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
 
Microsoft threat protection + wdatp+ aatp overview
Microsoft threat protection + wdatp+ aatp  overviewMicrosoft threat protection + wdatp+ aatp  overview
Microsoft threat protection + wdatp+ aatp overview
 
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEMTWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
 
Cloud security (domain6 10)
Cloud security (domain6 10)Cloud security (domain6 10)
Cloud security (domain6 10)
 
Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
 
Cloud summit demystifying cloud security
Cloud summit   demystifying cloud securityCloud summit   demystifying cloud security
Cloud summit demystifying cloud security
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 

Destaque

EMC Cloud Management
EMC Cloud ManagementEMC Cloud Management
EMC Cloud ManagementCenk Ersoy
 
Operational Best Practices in the Cloud
Operational Best Practices in the CloudOperational Best Practices in the Cloud
Operational Best Practices in the CloudRightScale
 
Cloud Security Guidance from CESG and AWS
Cloud Security Guidance from CESG and AWSCloud Security Guidance from CESG and AWS
Cloud Security Guidance from CESG and AWSAmazon Web Services
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Chad Lawler
 
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)Amazon Web Services
 
Cloud service management
Cloud service managementCloud service management
Cloud service managementgaurav jain
 

Destaque (8)

Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
EMC Cloud Management
EMC Cloud ManagementEMC Cloud Management
EMC Cloud Management
 
Operational Best Practices in the Cloud
Operational Best Practices in the CloudOperational Best Practices in the Cloud
Operational Best Practices in the Cloud
 
Cloud Security Guidance from CESG and AWS
Cloud Security Guidance from CESG and AWSCloud Security Guidance from CESG and AWS
Cloud Security Guidance from CESG and AWS
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
 
TOGAF 9 - Security Architecture Ver1 0
TOGAF 9 -  Security Architecture Ver1 0TOGAF 9 -  Security Architecture Ver1 0
TOGAF 9 - Security Architecture Ver1 0
 
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
 
Cloud service management
Cloud service managementCloud service management
Cloud service management
 

Semelhante a Cloud Security for U.S. Military Agencies

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxsarah david
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfCiente
 
Understanding_the_Cloud
Understanding_the_CloudUnderstanding_the_Cloud
Understanding_the_CloudMelissa Kattke
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfsarah david
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelinesSrishti Ahuja
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelinesSrishti Ahuja
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital ForensicIRJET Journal
 
Cloud computing & service level agreements
Cloud computing & service level agreementsCloud computing & service level agreements
Cloud computing & service level agreementsCade Zvavanjanja
 
Sikkerhet i skyen v/ Ole Tom Seierstad, Chief Security Adviser, Microsoft Norge
Sikkerhet i skyen v/ Ole Tom Seierstad, Chief Security Adviser,  Microsoft NorgeSikkerhet i skyen v/ Ole Tom Seierstad, Chief Security Adviser,  Microsoft Norge
Sikkerhet i skyen v/ Ole Tom Seierstad, Chief Security Adviser, Microsoft NorgeIKT-Norge
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataGreat Wide Open
 

Semelhante a Cloud Security for U.S. Military Agencies (20)

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Understanding_the_Cloud
Understanding_the_CloudUnderstanding_the_Cloud
Understanding_the_Cloud
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
cloud Resilience
cloud Resilience cloud Resilience
cloud Resilience
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
Cloud resilience, provisioning
Cloud resilience, provisioning Cloud resilience, provisioning
Cloud resilience, provisioning
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Cc unit 4 updated version
Cc unit 4 updated versionCc unit 4 updated version
Cc unit 4 updated version
 
Cloud computing & service level agreements
Cloud computing & service level agreementsCloud computing & service level agreements
Cloud computing & service level agreements
 
Sikkerhet i skyen v/ Ole Tom Seierstad, Chief Security Adviser, Microsoft Norge
Sikkerhet i skyen v/ Ole Tom Seierstad, Chief Security Adviser,  Microsoft NorgeSikkerhet i skyen v/ Ole Tom Seierstad, Chief Security Adviser,  Microsoft Norge
Sikkerhet i skyen v/ Ole Tom Seierstad, Chief Security Adviser, Microsoft Norge
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your Data
 

Último

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Último (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Cloud Security for U.S. Military Agencies

  • 1. Cloud Security NJVC, LLC Proprietary Data. Do Not Distribute
  • 2.  NJVC® is an IT contractor supporting the Intelligence Community and Department of Defense (DoD), and specializes in providing IT solutions to customers with highly secure requirements.  NJVC has designed/implemented/maintained multiple data centers for an IC agency for more than a decade, including modernizing the data center environment from a legacy stove-piped set of physical servers to a modernized cloud architecture with a managed service framework.  NJVC has hosted/migrated/transitioned more than 300 distinct mission systems or production entities over the past five years. This continued work within the area of transition systems between data center environments has provided NJVC unique experience, and allowed us to establish a proven, standard, scalable process to support any system migrating between architectures.  Steven R. Thomas, PMP  NJVC Director, Technical Operations  Chief Engineer on a large program for an IC agency  Chair of the Engineering Review Board 2 Background NJVC, LLC Proprietary Data. Do Not Distribute
  • 3. 3 Cloud security is an evolving area within the larger arena of cyber security. Refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud architectures and cloud environments Cloud Security The extensive use of virtualization in implementing cloud infrastructure brings unique security concerns for missions, applications, or tenants hosted within a cloud environment. NJVC, LLC Proprietary Data. Do Not Distribute
  • 4. Strategic Framework for Cloud Security 4 Assess Strategic Objective 1 Plan Strategic Objective 2 Transition Strategic Objective 3 Sustain Strategic Objective 4 Provide a strategic framework for secure mission operations within a cloud environment  Assess the current security state of your environment and each mission system  Understand cloud services and what they provide  Understand the security issues/risks present in the cloud  Assess the level of change that you are facing moving to the cloud  Gather and analyze the security requirements for each mission system against cloud services  Draw clear lines of responsibilities for security within the cloud  Identify and document how each mission will use cloud services, including security services  Develop a transition plan for moving to the cloud that includes security  Maintain security posture during transition  Verify all data is secure and properly accessible  Test and verify all security functions, tools, and services are in place and performing as expected  Establish a mechanism to periodically audit all security services  Monitor and report against security related SLAs, metrics, and performance measurements  Maintain certification and accreditation of all systems  Require cloud service providers to maintain all DoD and FedRAMP security requirements Mature Strategic Objective 7  Establish a total security framework that provides “defense in depth”  Data consolidation  Automation of security  Correlation and aggregation of all data  Generates actionable intelligence  Real-time view of enterprise Ensuring the cloud is secure As of 09 Mar 2014 NJVC, LLC Proprietary Data. Do Not Distribute
  • 5.  Many of the same security risks present in non-cloud IT deployments are still in play.  Several new ones are introduced.  Greater number of entry points and input/output paths  A single organization, department, user, or application can threaten the entire cloud  Compromise the virtualization software or "hypervisor”  Increase in brute force attacks  Insider threats now include outsiders in multi-tenant clouds 5 The Non-Secure Cloud Just because a cloud is built inside a secure facility, operates behind a firewall, and traverse encrypted networks doesn't mean it is secure. Assess Strategic Objective 1 NJVC, LLC Proprietary Data. Do Not Distribute
  • 6. Transitioning from a legacy physical, distributed IT environment to a cloud environment fundamentally changes your security threats, security exposure, security risk, and security posture. Understanding the shared security model is one of the biggest hurdles with securing cloud environments. 6 Changes in Security A vulnerable service in a cloud presents greater exposure and risk than the same service in a standard server farm due to the shared nature of cloud resources. The bank robber Willie Sutton is reputed with replying to a reporter's inquiry as to why he robs banks by saying: “Because that's where the money is." Assess Strategic Objective 1 NJVC, LLC Proprietary Data. Do Not Distribute
  • 7. Security responsibilities for a cloud architecture fall into two broad categories 1. Responsibility for the cloud architecture or cloud service provider (CSP) (providing software, platform, or infrastructure as a service)  CSPs generally assume the responsibility to maintain/patch the foundational services, networks, and operating systems (OS). 2. Responsibility for the data and mission systems/applications within the cloud  Customers and/or consumers are often responsible for securing and patching the application and data layers. 7 Cloud Security Responsibilities Questions you should be asking  Is security a stated service offering(s) and if so, what does that service(s) provide?  Is security embedded/included with other service offerings?  What security-related DoD policies, directives, or processes are followed and how are they implemented?  Can service level agreements (SLAs) be established based on security performance measurements?  Is security-focused monitoring and reporting offered? Plan Strategic Objective 2 NJVC, LLC Proprietary Data. Do Not Distribute
  • 8. Proper security services and functions must be part of your planning to ensure the security of the missions systems within the cloud. 8 Cloud Security Services  Identity management/privacy – Ensures all sensitive data is encrypted, and controls access to information and resources  Physical and personnel security – Ensures physical machines are adequately secure and access to machines and data is restricted and tracked  Application security – Provides testing/acceptance procedures and ensures patch management of applications/tools  Business continuity/data recovery – Ensures services can be maintained in case of a disaster and that any lost data can be recovered  Logs/audit trails – Ensures logs and audit trails are produced, secured, and maintained for purposes accreditation, security audits (CCRI), root cause analysis, or forensic investigation Plan Strategic Objective 2 NJVC, LLC Proprietary Data. Do Not Distribute
  • 9. Moving to a cloud environment is similar to moving from one house to another. As such, many of the same best practices should be applied.  Stop hoarding and de-clutter  Do not move unnecessary applications or missions to the cloud—decommission them  Do not move things that are broken or damaged  Do not move applications that have known security problems. Fix your CAT 1 and CAT 2 security issues  Change your locks once you move in  Change all the default passwords and admin passwords provided in the cloud 9 Transitioning to the Cloud Transition Strategic Objective 3 NJVC, LLC Proprietary Data. Do Not Distribute
  • 10.  Determine if you can bring existing security system to your new home  Determine if existing and proven security systems, tools, and processes can be used within or integrated with the cloud  Understand the crime in your new area  Understand the known security threats posed by your new cloud environment  Do not leave anything unsecure while being moved  Do not drop or lessen your security posture while applications or systems are transitioning to the cloud  Verify everything is safe once the move is completed  Make sure all your data and applications are secure and functional once the transition to the cloud is complete 10 Transitioning to the Cloud Transition Strategic Objective 3 NJVC, LLC Proprietary Data. Do Not Distribute
  • 11.  Detection capabilities need to be cloud-specific and provide near real time data to consumers.  Authentication/authorization must be robust and integrate with DoD identity management models (CAC, PKI, etc.).  Security sensors need to monitor both the interior/exterior of the cloud and send alerts to both the CSP and mission system owners.  Operational capabilities, such as patch management, must be constantly maintained and allow for agile rapid deployments. 11 Government Clouds Cloud environments should improve overall security levels and establish an enhanced security posture that leverages agility and technology. Sustain Strategic Objective 4 NJVC, LLC Proprietary Data. Do Not Distribute
  • 12. Agreements must be established between the CSP and consumer, such as contracts, SLAs, and operation support agreements. Agreements between the CSP and customer must address a number of areas. 12 Cloud Agreements  Ownership/privacy of data – Multiple tenants, organizations or commands may reside in the same cloud  Compliance – With all appropriate DoD and federal regulations and directives  Performance – Establish performance levels for uptime, access, reporting, outages, etc.  Recovery – Applications and/or tenant data recovery times  Security – Define all security at each level (access, data, database, application, infrastructure, etc.) Sustain Strategic Objective 4 NJVC, LLC Proprietary Data. Do Not Distribute
  • 13. All organizations and departments operating within a cloud should  Leverage the DoD and FedRAMP processes and approved security authorization requirements as a baseline when initiating, reviewing, granting, and revoking security authorizations for cloud services  Require CSPs to meet DoD and FedRAMP requirements via contractual provisions  Identify and report on cloud services being used that do not meet DoD and FedRAMP requirements 13 Cloud Certification & Accreditation The Federal Risk and Authorization Management Program (FedRAMP) provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. The DoD is going beyond FedRAMP. Computer network defense service provider will manage the security data reporting between DoD organizations and oversight agencies, like Cyber Command and DISA. Sustain Strategic Objective 4 NJVC, LLC Proprietary Data. Do Not Distribute
  • 14. Cloud Security Maturity  Consolidation – Data consolidation to improve efficiency and unify security information provided across the cloud  Automation – Automation of security processes, services, and tools to require less manpower; increase response times to threats; and improve efficiency to provide better service  Collaboration – Remove the barriers of data, software, or IT architecture to facilitate correlation and aggregation of all data feeds to support defense in depth  Intelligence – Generates easy to understand actionable intelligence: to spur decisions by administrators and operators  Visibility – Maintain real-time view of enterprise, including all connected devices and provide continuous monitoring to meet continuous threats 14 Target to move here Mature Strategic Objective 7 Security measures and security services provided by the cloud should NEVER constitute the totality of your security model. Approach security from a holistic point of view with a layered security “defense in depth” posture against cyber threats NJVC, LLC Proprietary Data. Do Not Distribute
  • 15. Government as a Platform  Government business model changes from isolated systems to integrated services.  Data ownership, service agreements, and governance of service processes are key issues.  Cloud implementation requires the most focus on information assurance and security.  Need exists for better integrated security and threat sharing across the cloud boundaries.  Security is the worst inhibitor of cloud integration and deployment. Think government as a platform—big-data-accessible, mission events, and streaming service integration to serve mission needs NJVC, LLC Proprietary Data. Do Not Distribute 15
  • 16. NJVC, LLC Proprietary Data. Do Not Distribute www.njvc.com 16

Notas do Editor

  1. Written for IC/DoD customers and potential partners in this space. The customer wants to know that we understand its mission, really good at what we do from a technology perspective and can deliver results. The potential partner wants to know that we understand its customers’ specific environment and challenges and “hottest” proof points showing the depth and breadth of our work at the front of the deck. We must get their attention right away … so less is more in terms of # of slides and copy on slides. Most important information should be conveyed … goal is for customer/partner to request a meeting or additional information.
  2. Cloud security is not to be confused with security software offerings that are cloud-based such as security as a service. Perhaps the greatest security struggle within any multi-tenant Cloud environment centers around identity management and ability to understand “Who is who” within the cloud It is critical that strong Identity Management framework be in place within any Cloud architecture Identity Spans the Cloud and provides Integration Between: Users & Devices and Infrastructure Infrastructure and Apps & Services Users & Devices and Apps & Services Identity Management can be broken in four distinct areas of responsibility Administration Authentication Authorization Auditing
  3. OMB memo December 8, 2011, all low and moderate impact cloud services leveraged by more than one office or agency must comply with FedRAMP requirements by 2014.