SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
www.skyviewpartners.com                                                                                       6/7/2012




                                                                             Carol Woodbury, President
                                                                                 SkyView Partners, Inc.
                                                                             www.skyviewpartners.com
                                                                                     @carolwoodbury




                                                          (c) SkyView Partners, Inc, 2012.
                                                                 All Rights Reserved.                     1




                                                        (c) SkyView Partners, Inc, 2012.
                                                               All Rights Reserved.                       2




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                               1
www.skyviewpartners.com                                                                         6/7/2012




                            Benefits:                        However:
                             Hardware                        Must meet
                             Support of the                   requirements of
                              hardware                         security policy
                             Software licensing              Legal requirements

                             Software maintenance            Compliance
                                                               requirements




                                                         (c) SkyView Partners, Inc, 2012.
                                                                All Rights Reserved.        3




                               Depends on the type of data




                                                         (c) SkyView Partners, Inc, 2012.
                                                                All Rights Reserved.        4




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                 2
www.skyviewpartners.com                                                                            6/7/2012




                               EU Data Protection Laws
                                ◦ Currently being revised




                                                            (c) SkyView Partners, Inc, 2012.
                                                                   All Rights Reserved.        5




                            Determines
                             Default access
                             Encryption requirements
                             Retention requirements
                             Storage requirements
                             Disposal method (both printed and online)


                            While considering
                             Compliance requirements
                             Legal considerations



                                                            (c) SkyView Partners, Inc, 2012.
                                                                   All Rights Reserved.        6




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                    3
www.skyviewpartners.com                                                                            6/7/2012




                               Data classification requirements don’t change just
                                because the data is now in the cloud




                                                            (c) SkyView Partners, Inc, 2012.
                                                                   All Rights Reserved.        7




                               Carefully plan the security and privacy aspects of cloud
                                computing solutions before engaging them (a cloud
                                provider.)
                               Understand the public cloud computing environment
                                offered by the cloud provider.
                               Ensure that a cloud computing solution satisfies
                                organizational security and privacy requirements.
                               Ensure that the client-side computing environment meets
                                organizational security and privacy requirements for cloud
                                computing.
                               Maintain accountability over the privacy and security of
                                data and applications implemented and deployed in public
                                cloud computing environments.

                                                            (c) SkyView Partners, Inc, 2012.
                                                                   All Rights Reserved.        8




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                    4
www.skyviewpartners.com                                                                               6/7/2012




                               Encryption
                               Auditing (logging)
                               No passwords in cleartext
                               Access controls
                               Reporting
                               Incident response handling

                               What will a QSA or auditor say …?



                                                              (c) SkyView Partners, Inc, 2012.
                                                                     All Rights Reserved.         9




                               Where is the data physically located
                               Incident response handling
                                ◦ Do you and provider have the same definition of a breach?
                               Can your SLAs be fulfilled?
                                ◦ (think disaster-recovery)


                               As well as compliance requirements




                                                              (c) SkyView Partners, Inc, 2012.
                                                                     All Rights Reserved.        10




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                       5
www.skyviewpartners.com                                                                                  6/7/2012




                               Questions for providers’ security practices:
                                ◦   Is admin (root) power limited to only those users needing it?
                                ◦   Who/What is logged?
                                ◦   Do administrators access systems via encrypted sessions?
                                ◦   What is the patch management strategy?
                                ◦   What anti-virus / anti-malware software is used?
                                ◦   Are the servers in compliance with
                                     PCI
                                     SOX
                                     HIPAA
                                ◦ Who are you audited by and can we see the results?

                                                                 (c) SkyView Partners, Inc, 2012.
                                                                        All Rights Reserved.        11




                               User management:
                                ◦ Process to integrate with HR to remove access?
                                     What about immediate removal for terminated
                                      employees/contractors?
                                ◦ Password composition rules?
                                ◦ Password change rules?




                                                                 (c) SkyView Partners, Inc, 2012.
                                                                        All Rights Reserved.        12




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                          6
www.skyviewpartners.com                                                                                      6/7/2012




                               Logging:
                                ◦ Invalid sign on attempts
                                     Lock-out for excess attempts
                                ◦   Reads and changes to HIPAA or PCI data
                                ◦   Access attempts to data
                                ◦   Retention of the logs
                                ◦   Review of the logs

                               Network logging:
                                ◦ Connections
                                ◦ Data movement – what about DLP?

                                                                     (c) SkyView Partners, Inc, 2012.
                                                                            All Rights Reserved.        13




                               Because the service provider holds so much data, they
                                may become a victim of a targeted attack

                               However … provider likely has
                                ◦ Network monitoring
                                ◦ Trained personnel to recognize and respond to the attack
                                ◦ Knowledge / Hardware to prevent or limit the attack




                                                                     (c) SkyView Partners, Inc, 2012.
                                                                            All Rights Reserved.        14




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                              7
www.skyviewpartners.com                                                                                   6/7/2012




                               Business level objectives
                               Responsibilities of both parties
                               Business continuity/disaster recovery
                               Redundancy
                               Maintenance
                               Data location
                               Data seizure
                               Provider failure
                               Jurisdiction
                               Brokers and resellers

                            http://www.ibm.com/developerworks/cloud/library/cl-
                            rev2sla.html?ca=drs-


                                                               (c) SkyView Partners, Inc, 2012.
                                                                      All Rights Reserved.           15




                               Security                               Incident response
                               Data encryption                        Transparency
                               Privacy                                Certification
                               Data retention and                     Performance definitions
                                deletion                               Monitoring
                               Hardware erasure,                      Auditability
                                destruction                            Metrics
                               Regulatory compliance                  Human interaction


                                                              (c) SkyView Partners, Inc, 2012. All
                                                                        Rights Reserved.             16




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                           8
www.skyviewpartners.com                                                                              6/7/2012




                               Determine your organization’s security and compliance
                                requirements for the type of data going to the cloud
                               Put the appropriate SLA in place
                                ◦ Terminology / Communication is key – make sure you agree to
                                  each others’ definitions
                               Monitor the results to determine if SLA is being met




                                                             (c) SkyView Partners, Inc, 2012.
                                                                    All Rights Reserved.        17




                               Find your private and confidential data

                               Do not assume it doesn’t exist just because it’s not
                                supposed to be a on specific server or in a specific
                                database!




                                                             (c) SkyView Partners, Inc, 2012.
                                                                    All Rights Reserved.        18




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                      9
www.skyviewpartners.com                                                                                 6/7/2012




                               Many organizations are realizing the benefits of
                                “private” clouds
                                ◦ Reduced hardware / software costs
                                ◦ Quicker patching
                                ◦ Consolidated security expertise
                                   Monitoring (NOC)
                                   Recognition and response to incidents
                                ◦ Consolidated logging (correlated events)
                                ◦ More layers of security (depending on the data requirements)




                                                                (c) SkyView Partners, Inc, 2012.
                                                                       All Rights Reserved.        19




                               Clouds specializing in meeting compliance needs:
                                ◦ PCI
                                ◦ HIPAA

                               Significantly more expensive but consider that with
                                public clouds you ‘get what you pay for.’




                                                                (c) SkyView Partners, Inc, 2012.
                                                                       All Rights Reserved.        20




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                        10
www.skyviewpartners.com                                                                                                 6/7/2012




                               Service providers have been providing “cloud” services
                                for many years
                                ◦ Private / Specialized cloud – typically without the dynamic
                                  allocation of new resources
                               Security/Compliance/Legal requirements you make of
                                them are the same as what we’ve been discussing.




                                                                           (c) SkyView Partners, Inc, 2012.
                                                                                  All Rights Reserved.             21




                            Best practices and Certifications for Cloud Security
                             https://cloudsecurityalliance.org/


                            Guidelines on Security and Privacy in Public Cloud Computing – National Institute of
                            Standards and Technology (NIST) SP 800-144
                               http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf

                            Cloud Computing Synopsis and Recommendations - – National Institute of Standards and
                            Technology (NIST) SP 800-146 – DRAFT
                             http://csrc.nist.gov/publications/drafts/800-146/Draft-NIST-SP800-146.pdf


                            Articles:
                             www.sans.org
                             www.isaca.org
                             Search ‘European cloud Computing Strategy’


                            Contact us at: info@skyviewpartners.com
                                             @carolwoodbury


                                                                           (c) SkyView Partners, Inc, 2012.
                                                                                  All Rights Reserved.             22




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                                        11

Mais conteúdo relacionado

Destaque (7)

Business continuity with SAP on IBM i
Business continuity with SAP on IBM iBusiness continuity with SAP on IBM i
Business continuity with SAP on IBM i
 
Practical web services for RPG lab exercises
Practical web services for RPG lab exercisesPractical web services for RPG lab exercises
Practical web services for RPG lab exercises
 
IBM Systems Director Navigator for i
IBM Systems Director Navigator for iIBM Systems Director Navigator for i
IBM Systems Director Navigator for i
 
What's new with Zend server
What's new with Zend serverWhat's new with Zend server
What's new with Zend server
 
Using Ruby on IBM i (i5/OS)
Using Ruby on IBM i (i5/OS)Using Ruby on IBM i (i5/OS)
Using Ruby on IBM i (i5/OS)
 
Practical PHP by example Jan Leth-Kjaer
Practical PHP by example   Jan Leth-KjaerPractical PHP by example   Jan Leth-Kjaer
Practical PHP by example Jan Leth-Kjaer
 
Compiling the Compiler
Compiling the CompilerCompiling the Compiler
Compiling the Compiler
 

Semelhante a Security considerations for the cloud

Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecSecuring Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSec
CloudPassage
 
Setting Up Your Mobile Testing Factory for 2013
Setting Up Your Mobile Testing Factory for 2013Setting Up Your Mobile Testing Factory for 2013
Setting Up Your Mobile Testing Factory for 2013
SOASTA
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013
David Linthicum
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012
steveramsthel
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012
steveramsthel
 
CA Security - Deloitte IAM Summit - Vasu
CA Security - Deloitte IAM Summit  - VasuCA Security - Deloitte IAM Summit  - Vasu
CA Security - Deloitte IAM Summit - Vasu
Vasu Surabhi
 

Semelhante a Security considerations for the cloud (20)

Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...
Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...
Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...
 
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecSecuring Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSec
 
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity SummitOAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
 
Software Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and StorageSoftware Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and Storage
 
eFolder AppAssure Cloud Briefing_Public
eFolder AppAssure Cloud Briefing_PubliceFolder AppAssure Cloud Briefing_Public
eFolder AppAssure Cloud Briefing_Public
 
Setting Up Your Mobile Testing Factory for 2013
Setting Up Your Mobile Testing Factory for 2013Setting Up Your Mobile Testing Factory for 2013
Setting Up Your Mobile Testing Factory for 2013
 
Software Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and StorageSoftware Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and Storage
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012
 
STPCon fall 2012: The Testing Renaissance Has Arrived
STPCon fall 2012: The Testing Renaissance Has ArrivedSTPCon fall 2012: The Testing Renaissance Has Arrived
STPCon fall 2012: The Testing Renaissance Has Arrived
 
Cloud security ely kahn
Cloud security   ely kahnCloud security   ely kahn
Cloud security ely kahn
 
eFolder BDR Partner Presentation
eFolder BDR Partner PresentationeFolder BDR Partner Presentation
eFolder BDR Partner Presentation
 
WinWire_azure_session
WinWire_azure_sessionWinWire_azure_session
WinWire_azure_session
 
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs NoweFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
 
Exploiting Linked Data via Filemaker
Exploiting Linked Data via FilemakerExploiting Linked Data via Filemaker
Exploiting Linked Data via Filemaker
 
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
 
Identity Management for the Cloud
Identity Management for the CloudIdentity Management for the Cloud
Identity Management for the Cloud
 
eFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCraft
eFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCrafteFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCraft
eFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCraft
 
CA Security - Deloitte IAM Summit - Vasu
CA Security - Deloitte IAM Summit  - VasuCA Security - Deloitte IAM Summit  - Vasu
CA Security - Deloitte IAM Summit - Vasu
 

Mais de COMMON Europe

Mais de COMMON Europe (20)

What's New in WebSphere Application Server
What's New in WebSphere Application ServerWhat's New in WebSphere Application Server
What's New in WebSphere Application Server
 
Workload Groups overview updates
Workload Groups overview updatesWorkload Groups overview updates
Workload Groups overview updates
 
Why i - Common Europe 2012
Why i - Common Europe 2012Why i - Common Europe 2012
Why i - Common Europe 2012
 
The Ruby OpenSSL extension
The Ruby OpenSSL extensionThe Ruby OpenSSL extension
The Ruby OpenSSL extension
 
IBM i Trends & Directions Common Europe 2012
IBM i Trends & Directions Common Europe 2012IBM i Trends & Directions Common Europe 2012
IBM i Trends & Directions Common Europe 2012
 
IBM i Technology Refreshes Overview 2012 06-04
IBM i Technology Refreshes Overview 2012 06-04IBM i Technology Refreshes Overview 2012 06-04
IBM i Technology Refreshes Overview 2012 06-04
 
IBM i 7.1 & TRs CEC 2012
IBM i 7.1 & TRs CEC 2012IBM i 7.1 & TRs CEC 2012
IBM i 7.1 & TRs CEC 2012
 
DB2 Web Query whats new
DB2 Web Query whats newDB2 Web Query whats new
DB2 Web Query whats new
 
Access client solutions overview
Access client solutions overviewAccess client solutions overview
Access client solutions overview
 
RPG investment
RPG investmentRPG investment
RPG investment
 
Php arrays for RPG programmers
Php arrays for RPG programmersPhp arrays for RPG programmers
Php arrays for RPG programmers
 
Open source report writing tools for IBM i Vienna 2012
Open source report writing tools for IBM i  Vienna 2012Open source report writing tools for IBM i  Vienna 2012
Open source report writing tools for IBM i Vienna 2012
 
Introduction to My SQL
Introduction to My SQLIntroduction to My SQL
Introduction to My SQL
 
IBM CEC 2012 Storage june 11, 2012
IBM CEC 2012 Storage june 11, 2012IBM CEC 2012 Storage june 11, 2012
IBM CEC 2012 Storage june 11, 2012
 
Getting started with PHP on IBM i
Getting started with PHP on IBM iGetting started with PHP on IBM i
Getting started with PHP on IBM i
 
Developing mobile applications for i using open source tools Venna 2012
Developing mobile applications for i using open source tools  Venna 2012Developing mobile applications for i using open source tools  Venna 2012
Developing mobile applications for i using open source tools Venna 2012
 
DB2 for i 7.1 - Whats New?
DB2 for i 7.1 - Whats New?DB2 for i 7.1 - Whats New?
DB2 for i 7.1 - Whats New?
 
Common Europe SAP on i for beginners
Common Europe SAP on i for beginnersCommon Europe SAP on i for beginners
Common Europe SAP on i for beginners
 
Business value of PHP
Business value of PHPBusiness value of PHP
Business value of PHP
 
AD for i in modern world
AD for i in modern worldAD for i in modern world
AD for i in modern world
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 

Security considerations for the cloud

  • 1. www.skyviewpartners.com 6/7/2012 Carol Woodbury, President SkyView Partners, Inc. www.skyviewpartners.com @carolwoodbury (c) SkyView Partners, Inc, 2012. All Rights Reserved. 1 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 2 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 1
  • 2. www.skyviewpartners.com 6/7/2012 Benefits: However:  Hardware  Must meet  Support of the requirements of hardware security policy  Software licensing  Legal requirements  Software maintenance  Compliance requirements (c) SkyView Partners, Inc, 2012. All Rights Reserved. 3  Depends on the type of data (c) SkyView Partners, Inc, 2012. All Rights Reserved. 4 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 2
  • 3. www.skyviewpartners.com 6/7/2012  EU Data Protection Laws ◦ Currently being revised (c) SkyView Partners, Inc, 2012. All Rights Reserved. 5 Determines  Default access  Encryption requirements  Retention requirements  Storage requirements  Disposal method (both printed and online) While considering  Compliance requirements  Legal considerations (c) SkyView Partners, Inc, 2012. All Rights Reserved. 6 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 3
  • 4. www.skyviewpartners.com 6/7/2012  Data classification requirements don’t change just because the data is now in the cloud (c) SkyView Partners, Inc, 2012. All Rights Reserved. 7  Carefully plan the security and privacy aspects of cloud computing solutions before engaging them (a cloud provider.)  Understand the public cloud computing environment offered by the cloud provider.  Ensure that a cloud computing solution satisfies organizational security and privacy requirements.  Ensure that the client-side computing environment meets organizational security and privacy requirements for cloud computing.  Maintain accountability over the privacy and security of data and applications implemented and deployed in public cloud computing environments. (c) SkyView Partners, Inc, 2012. All Rights Reserved. 8 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 4
  • 5. www.skyviewpartners.com 6/7/2012  Encryption  Auditing (logging)  No passwords in cleartext  Access controls  Reporting  Incident response handling  What will a QSA or auditor say …? (c) SkyView Partners, Inc, 2012. All Rights Reserved. 9  Where is the data physically located  Incident response handling ◦ Do you and provider have the same definition of a breach?  Can your SLAs be fulfilled? ◦ (think disaster-recovery)  As well as compliance requirements (c) SkyView Partners, Inc, 2012. All Rights Reserved. 10 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 5
  • 6. www.skyviewpartners.com 6/7/2012  Questions for providers’ security practices: ◦ Is admin (root) power limited to only those users needing it? ◦ Who/What is logged? ◦ Do administrators access systems via encrypted sessions? ◦ What is the patch management strategy? ◦ What anti-virus / anti-malware software is used? ◦ Are the servers in compliance with  PCI  SOX  HIPAA ◦ Who are you audited by and can we see the results? (c) SkyView Partners, Inc, 2012. All Rights Reserved. 11  User management: ◦ Process to integrate with HR to remove access?  What about immediate removal for terminated employees/contractors? ◦ Password composition rules? ◦ Password change rules? (c) SkyView Partners, Inc, 2012. All Rights Reserved. 12 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 6
  • 7. www.skyviewpartners.com 6/7/2012  Logging: ◦ Invalid sign on attempts  Lock-out for excess attempts ◦ Reads and changes to HIPAA or PCI data ◦ Access attempts to data ◦ Retention of the logs ◦ Review of the logs  Network logging: ◦ Connections ◦ Data movement – what about DLP? (c) SkyView Partners, Inc, 2012. All Rights Reserved. 13  Because the service provider holds so much data, they may become a victim of a targeted attack  However … provider likely has ◦ Network monitoring ◦ Trained personnel to recognize and respond to the attack ◦ Knowledge / Hardware to prevent or limit the attack (c) SkyView Partners, Inc, 2012. All Rights Reserved. 14 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 7
  • 8. www.skyviewpartners.com 6/7/2012  Business level objectives  Responsibilities of both parties  Business continuity/disaster recovery  Redundancy  Maintenance  Data location  Data seizure  Provider failure  Jurisdiction  Brokers and resellers http://www.ibm.com/developerworks/cloud/library/cl- rev2sla.html?ca=drs- (c) SkyView Partners, Inc, 2012. All Rights Reserved. 15  Security  Incident response  Data encryption  Transparency  Privacy  Certification  Data retention and  Performance definitions deletion  Monitoring  Hardware erasure,  Auditability destruction  Metrics  Regulatory compliance  Human interaction (c) SkyView Partners, Inc, 2012. All Rights Reserved. 16 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 8
  • 9. www.skyviewpartners.com 6/7/2012  Determine your organization’s security and compliance requirements for the type of data going to the cloud  Put the appropriate SLA in place ◦ Terminology / Communication is key – make sure you agree to each others’ definitions  Monitor the results to determine if SLA is being met (c) SkyView Partners, Inc, 2012. All Rights Reserved. 17  Find your private and confidential data  Do not assume it doesn’t exist just because it’s not supposed to be a on specific server or in a specific database! (c) SkyView Partners, Inc, 2012. All Rights Reserved. 18 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 9
  • 10. www.skyviewpartners.com 6/7/2012  Many organizations are realizing the benefits of “private” clouds ◦ Reduced hardware / software costs ◦ Quicker patching ◦ Consolidated security expertise  Monitoring (NOC)  Recognition and response to incidents ◦ Consolidated logging (correlated events) ◦ More layers of security (depending on the data requirements) (c) SkyView Partners, Inc, 2012. All Rights Reserved. 19  Clouds specializing in meeting compliance needs: ◦ PCI ◦ HIPAA  Significantly more expensive but consider that with public clouds you ‘get what you pay for.’ (c) SkyView Partners, Inc, 2012. All Rights Reserved. 20 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 10
  • 11. www.skyviewpartners.com 6/7/2012  Service providers have been providing “cloud” services for many years ◦ Private / Specialized cloud – typically without the dynamic allocation of new resources  Security/Compliance/Legal requirements you make of them are the same as what we’ve been discussing. (c) SkyView Partners, Inc, 2012. All Rights Reserved. 21 Best practices and Certifications for Cloud Security  https://cloudsecurityalliance.org/ Guidelines on Security and Privacy in Public Cloud Computing – National Institute of Standards and Technology (NIST) SP 800-144  http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf Cloud Computing Synopsis and Recommendations - – National Institute of Standards and Technology (NIST) SP 800-146 – DRAFT  http://csrc.nist.gov/publications/drafts/800-146/Draft-NIST-SP800-146.pdf Articles:  www.sans.org  www.isaca.org  Search ‘European cloud Computing Strategy’ Contact us at: info@skyviewpartners.com @carolwoodbury (c) SkyView Partners, Inc, 2012. All Rights Reserved. 22 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 11