SlideShare a Scribd company logo
1 of 56
1

                 IAPP Atlanta Chapter
                                          February 22, 2013




Cloud Assurance Basics
Phil Agcaoili
CISO, Cox Communications
Founding Member, Cloud Security Alliance (CSA)
Co-Founder and Co-Author, CSA Cloud Controls Matrix (CCM)
Co-Founder Security, Trust, & Assurance Registry (STAR) and GRC Stack
2
agenda

ā€¢ Intro to cloud computing
ā€¢ Legal and privacy concerns to consider
ā€¢ Latest developments of cloud security and
  assurance standards
3




Intro to cloud computing
What Is Cloud Computing?
                                                             4
ā€¢ The ā€œcloudā€ is a metaphor for the Internet
    ā€“ Leverages the connectivity of the Internet to optimize the utility of
      computing

ā€¢ It is not new!
    ā€“ Search is a cloud application (Google, Yahoo, Altavista)
    ā€“ Internet-based email services are cloud applications (Gmail, Yahoo!
      Mail, Hotmail, AOL Mail)
    ā€“ Social networking sites are cloud applications (Facebook, MySpace,
      Forums)
    ā€“ Similar to time-sharing and service bureau services from the mainframe
      days, or ASPā€™s from the 90ā€™s

ā€¢ Accessible anywhere with Internet access
    ā€“ There are public, private, managed and hybrid clouds
The Consumerā€™s View of Cloud
                                                                            5




                                                             ...Everything is
                                                             Cloud
Presentation_ID2008 Cisco Systems, Inc. All rights reserved. Confidential
             Ā©                                         Cisco
Evolution Over The Years
                                                                                         6
                                                                                      Cloud Computing with pay
                                                                                      as you go model, leveraging
                                                                                      virtualization for data center
                                                                                      efficiencies and faster
                                                                                      networks




                                                                     Software as a Service
                                                                     (SaaS) model with multi-
Adoption




                                                                     tenant hosting of
                                                                     applications


                                          ASP (Application Service
             John McCarthy                Provider) model with
           proposed 'computer time-       single tenant hosting of
           sharing technology' to be      applications
           sold through utility
           business model (like
           electricity) in a lecture at
           MIT


             1961                             Mid 90ā€™s                             Early 00ā€™s                  Late 00ā€™s

                                                              Time
The Technical View of Cloud                                          7




Presentation_ID2008 Cisco Systems, Inc. All rights reserved. Confidential
             Ā©                                         Cisco
NIST Cloud Deployment Models
                                                                               8
           Application                                     Applications at Scale
                (SaaS)                                          (End users)


                 Platform                                 Execution Platforms at
                      as a                                         Scale
                   Service                                     (Developers)

        Infrastructu                                    Infrastructure at Scale
                  re                                    (System Administrators)
        as a Service


             Enabling                                   Cloud Service Delivery at
           Technology                                              Scale
                                                         (Public / Private Cloud
                                                                Providers)

Presentation_ID2008 Cisco Systems, Inc. All rights reserved. Confidential
             Ā©                                         Cisco
Cloud Model :: Infrastructure as a Service (IaaS)
                                        9
Cloud Model :: Platform as a Service (PaaS)
                                        10
Cloud Model :: Software as a Service (SaaS)
                                     11
NIST Cloud Deployment Models
                                                                                   12


                                                                Cloud infrastructure made
                                   Public
                                                                 available to the general
                                    Cloud
                                                                         public.
                                                              Cloud infrastructure operated
                                 Private                       solely for an organization.
                                   Cloud
                                                            Cloud infrastructure composed
                                   Hybrid                     of two or more clouds that
                                    Cloud                      interoperate or federate
                                                                  through technology
                                                           Cloud infrastructure shared by
                           Community                          several organizations and
                               Cloud                       supporting a specific community
              ā€¦ and one other
                                                            Cloud services that simulate
                                Virtual                    the private cloud experience in
                                Private                      public cloud infrastructure
                                  Cloud
Presentation_ID2008 Cisco Systems, Inc. All rights reserved. Confidential
             Ā©                                         Cisco
Enterprise Deployment Models
         Distinguishing Between Ownership and 13
                                              Control

                                      Internal Resources                        External Resources
                                                               All cloud                  All cloud
   Ownership                                                   resources                  resources
                                                               owned by or                owned by
                                                               dedicated to Cloud
                                                                     Hybrid               providers;
                                                               enterprise                 used by many
                                                                            Interoperabil customers
                                                              ity and
                                                              portability
                                             Private Cloud            Public Cloud
                                                              among Public
                                                              and/or
                                                   Cloud      Private Cloud Cloud
         Control                                   definition/systems       definition/
                                                               governance                governance
                                                               controlled                controlled
                                                               by                        by provider
                                                               enterprise
Presentation_ID2008 Cisco Systems, Inc. All rights reserved. Confidential
             Ā©                                         Cisco
What This Means To Security
                                 14
                The lower down the stack the
Salesforce -    Cloud provider stops, the
    SaaS        more security you are
                tactically responsible for
                implementing & managing
                yourself.

               Google AppEngine - PaaS
                              Amazon EC2 - IaaS
15




Legal and privacy
concerns to consider
Be Prepared for Change
                                                       16
ā€¢ Cloud industry is immature and growing rapidly

ā€¢ New players will rapidly emerge to fill new market niches

ā€¢ Consolidation of the industry at some point is inevitable
   ā€“ You may not be as comfortable with new entity
       ā€¢ Google, Amazon, IBM, Microsoft, Dell, HP, Cisco, CSC, and Verizon
         all active in this area
   ā€“ Big players will create standards for security and governance


ā€¢ Cloud computing is disruptive to existing business
  models and IT practices
   ā€“ Disruptive technologies attract players who may not be around
     for the long term
Types of Issues
                                               17


ā€¢   Location (where is your data; what law governs?)
ā€¢   Operational (including service levels and security)
ā€¢   Legislation/Regulatory (including privacy)
ā€¢   Third-party contractual limitations on use of cloud
ā€¢   Security
ā€¢   Investigative/Litigation (eDiscovery)
ā€¢   Risk allocation/risk mitigation/insurance
Location Issues
                                                    18


ā€¢ Where will your data be located?
   ā€“ The cloud may be the ultimate form of globalization


ā€¢ What law governs?
   ā€“ You may or may not be able to control this by contract as the law
     in some countries can trump contractual provisions
   ā€“ State law is becoming increasingly relevant
   ā€“ Complying with a patchwork of federal and state privacy laws

ā€¢ Storing data in certain regions may not be acceptable to
  your customers, especially the government
Operational Issues
                                                     19


ā€¢ Vendor lock-in issues
   ā€“ Will you be bound to a certain application; platform; operating
     system?
   ā€“ Some critics, such as Richard Stallman, have called it ā€œa trap
     aimed at forcing more people to buy into locked, proprietary
     systems that will cost them more and more over timeā€

ā€¢ Can you transfer data and applications to and from the
  cloud?
Operational Issues
                                                 20
ā€¢ Backup/data restoration

ā€¢ Disaster recovery

ā€¢ Acceptable service levels

ā€¢ What do you do if the Internet crashes?
   ā€“ How is that risk allocated by contract?


ā€¢ Data retention issues
   ā€“ There many legal and tax reasons that company must retain
     data longer than cloud vendor is prepared to do so
Regulatory/Governance Issues
                                                     21


ā€¢ The more of these issues you have, the slower you will
  move to cloud computing
   ā€“ Early growth in cloud computing will come from small and
     medium sized businesses and give them a competitive
     advantage
   ā€“ Portion of cost savings will have to be reinvested into increased
     scrutiny of security capabilities of cloud providers

ā€¢ Some regions, such as the EU, have stringent rules
  concerning moving certain types of data across borders

ā€¢ Cloud computing not regulated ā€“yet
Regulatory/Governance Issues
                                           22
ā€¢ Patriot Act/UK Regulation of Investigatory Powers Act
ā€¢ Stored Communications Act (part of ECPA)
ā€¢ National Security Letters (may not even know of
  investigation)
ā€¢ PCI (credit card information)
ā€¢ HIPAA (health-related information)
ā€¢ GLB (financial services industry)
ā€¢ FTC and state privacy laws
ā€¢ ITARS, EARS, other export or trade restrictions will
  impact where data can be stored and who can store it
ā€¢ Video rental records
ā€¢ Fair Credit Reporting Act
ā€¢ Violence Against Women Act
ā€¢ Cable company customer records
Contracts Will Be The Key
Legal Enforcement Mechanism                          23


ā€¢ Privileged user access
   ā€“ Who has access to data and their backgrounds


ā€¢ Regulatory compliance
   ā€“ Vendor must be willing to undergo audits and security
     certifications

ā€¢ Data location
   ā€“ Can you control the physical location of your data?


ā€¢ Security
   ā€“ Implementation is a technical matter; responsibility is a legal one
Key Contractual Issues
                                                       24
ā€¢ Data segregation
   ā€“ Use of encryption to protect data ā€“a sometimes tricky issue


ā€¢ Recovery
   ā€“ What happens to your data and apps in the event of a disaster?
   ā€“ You should have test procedures in place


ā€¢ Long-term viability
   ā€“ What happens to data and apps if company goes out of
     business?

ā€¢ Investigative support
   ā€“ Will vendor investigate illegal or inappropriate activity?


ā€¢ What happens in the event of a security breach?
Security Issues
                                                     25
ā€¢ Physical security
   ā€“ Physical location of data centers; protection of data centers
     against disaster and intrusion

ā€¢ Operational security
   ā€“ Who has access to facilities/applications/data?
   ā€“ Will you get a ā€œprivate cloudā€ or a service delivered more on a
     ā€œutilityā€ model?

ā€¢ Programmatic security
   ā€“ Software controls that limit vendor and other access to data and
     applications (firewalls; encryption; access and rights
     management)
   ā€“ Encryption accidents can make data unusable
Investigative/Litigation Issues
                                                     26

ā€¢ Third party access
   ā€“ Subpoenas
       ā€¢ You may not even know about them if vendor gets the subpoena
   ā€“ Criminal/national security investigations
   ā€“ Search warrants; possible seizures

ā€¢ eDiscovery
   ā€“ How are document holds enforced; metadata protected;
     information searched for and retrieved?

ā€¢ You must have clear understanding of what cloud
  provider will do in response to legal requests for
  information
Intellectual Property Issues
                                                      27


ā€¢ The big issue is trade secret protection
   ā€“ If third parties have access to trade secret information, that could
     destroy the legal protection of trade secrets
   ā€“ This can be ameliorated by appropriate contractual non-
     disclosure provisions


ā€¢ Same concern for attorney-client privileged information
Risk Allocation/Management
ā€¢ No benchmarks today for service levels                     28


ā€¢ No cloud vendor can offer a 100% guarantee
    ā€“ The most trusted and reliable vendor can still fail
    ā€“ Should replicate data and application availability at multiple sites
    ā€“ Should you escrow data or application code?

ā€¢ A premium will be charged based on the degree of accountability
  demanded

ā€¢ Responsibility of customer to determine if it is comfortable with risk
  of putting service in the cloud

ā€¢ Many publicly available cloud computing contracts limit liability of
  hosting provider to a level that is not in line with the potential risk

ā€¢ Cloud computing contracts resemble typical software licenses,
  although potential risk is much higher
Insurance
                                            29


ā€¢ Will business interruption insurance provide coverage if
  your business goes down because of problem at cloud
  vendor?

ā€¢ Do Commercial General Liability (CGL) or other types of
  liability coverage handle claims that arise from privacy
  breaches or other events at the cloud level?

ā€¢ Are you covered if your cloud vendor gets hacked?
Checklist of Things to Consider
                                                     30
ā€¢ Financial viability of cloud provider

ā€¢ Plan for bankruptcy or unexpected termination of the
  relationship and orderly return of disposal of
  data/applications
   ā€“ Vendor will want right to dispose of your data if you donā€™t pay

ā€¢ Contract should include agreement as to desired service
  level and ability to monitor it

ā€¢ Negotiate restrictions on secondary uses of data and
  who at the vendor has access to sensitive data

ā€¢ Understand cloud providerā€™s information security
  management systems
Checklist of Things to Consider
ā€¢ Negotiate roles for response to eDiscovery requests
                                            31


ā€¢ Ensure that you have ability to audit on demand and
  regulatory and business needs require
   ā€“ Companies subject to information security standards such as
     ISO 27001, must pass to subs same obligation

ā€¢ Make sure that cloud provider policies and processes for
  data retention and destruction are acceptable

ā€¢ Provide for regular backup and recovery tests

ā€¢ Consider data portability application lock-in concerns

ā€¢ Understand roles and notification responsibilities in event
  of a breach
Checklist of Things to Consider
                                                       32
ā€¢ Data encryption is very good for security, but potentially
  risky; make sure you understand it
   ā€“ Will you still be able to de-crypt data years later?

ā€¢ Understand and negotiate where your data will be
  stored, what law controls and possible restrictions on
  cross-border transfers

ā€¢ Third-party access issues

ā€¢ Consider legal and practical liability for force majeure
  events
   ā€“ Must be part of disaster recovery and business continuity plan

ā€¢ There is no substitute for careful due diligence
33




Latest developments in
cloud security assurance
CSA Cloud Controls Matrix (CCM)
AICPA SOC Reports
CSA Open Certification Framework (OCF)
34
35


Our research includes
fundamental projects
needed to define and
implement trust within the
future of information
technology
CSA continues to be
aggressive in producing
critical research, education
and tools
22 Active Work Groups and
10 in the pipeline
                    Copyright Ā© 2011 Cloud Security Alliance         www.cloudsecurityalliance.org
                     Copyright Ā© 2012 Cloud Security Alliance
36




GRC Stack
 Family of 4 research
 projects
   Cloud Controls Matrix (CCM)

   Consensus Assessments Initiative
   (CAI)

   Cloud Audit

   Cloud Trust Protocol (CTP)
                                                       Private,
                                                       Private,
                                                    Community &
                                                    Community &
                                        Control     Public Clouds
                                                     Public Clouds   Provider
                                      Requirement                    Assertion
                                           s                            s
37




ā€¢   Controls derived from
    guidance
ā€¢   Mapped to familiar
    frameworks: ISO 27001,
    COBIT, PCI, HIPAA, FISMA,
    FedRAMP, etc.
ā€¢   Rated as applicable to S-P-I
ā€¢   Customer vs. Provider role
ā€¢   Help bridge the ā€œcloud gapā€
    for IT & IT auditors
38



ā€¢   Research tools and processes to
    perform shared assessments of cloud
    providers
ā€¢   Integrated with Controls Matrix
ā€¢   Version 1 CAI Questionnaire released
    Oct 2010, approximately 140
    provider questions to identify
    presence of security controls or
    practices
ā€¢   Use to assess cloud providers today,
    procurement negotiation, contract
    inclusion, quantify SLAs
39




ā€¢       CSA STAR
                          (Security,
        Trust and Assurance Registry)
    ā€“    Public Registry of Cloud Provider self assessments
    ā€“    Based on Consensus Assessments Initiative
         Questionnaire
         ā€¢   Provider may substitute documented Cloud Controls Matrix
             compliance
    ā€“    Voluntary industry action promoting transparency
    ā€“    Free market competition to provide quality
         assessments
         ā€¢   Provider may elect to provide assessments from third parties
Security Assurance - A Better Way
CSA Open Certification Framework (OCF)
                                                                  40




 The CSA Open Certification Framework is an industry initiative to allow
 global, accredited, trusted certification of cloud providers.
 The CSA Open Certification Framework is a program for flexible,
 incremental and multi-layered cloud provider certification according to the
 Cloud Security Allianceā€™s industry leading security guidance and control
 objectives.
 The program will integrate with popular third-party assessment and
 attestation statements developed within the public accounting community to
 avoid duplication of effort and cost.
 ~Jim Reavis & Daniele Catteddu; CSA~




                       Copyright Ā© 2011 Cloud Security Alliance        www.cloudsecurityalliance.o
Security Assurance - A Better Way
  CSA Open Certification Framework (OCF)
  OCF Level 1: CSA STAR Registry        41



CSA STAR (Security, Trust and Assurance Registry)

Public Registry of Cloud Provider self assessments

Based on Consensus Assessments Initiative Questionnaire (CAIQ)
  Provider may substitute documented Cloud Controls Matrix
  compliance

Voluntary industry action promoting transparency

Free market competition to provide quality assessments
  Provider may elect to provide assessments from third parties

Available since October 2011


                      Copyright Ā© 2011 Cloud Security Alliance   www.cloudsecurityalliance.or
OCF: The structure

                                                                        42




      The open certification framework is structured on 3 LEVELs of TRUST,
      each one of them providing an incremental
      level of visibility and transparency into the operations of the Cloud
      Service Provider and a higher level of assurance to the Cloud
      consumer.


                             Copyright Ā© 2011 Cloud Security Alliance         www.cloudsecurityalliance.o
43




Service Organization Control Reports (SOC)
AICPA SAS No. 70, Service Organizations
                                           44


ā€¢A standard for reporting on a service
organizationā€™s controls affecting user entities'
financial statements.

ā€¢Only for use by service organization
management, existing user entities, and their
auditors.

ā€¢Replaced by SSAE 16 SOC 1 in 2011
SAS No. 70, Service Organizations
                                          45
Misuse:
ā€¢ā€œSAS 70 Certifiedā€ or ā€œSAS 70 Compliantā€

ā€¢Controls related to subject matter other than
internal control over financial reporting

ā€¢Made report public
Other Service Organization Control
Reports (SOC)                        46


Marketplace demand for detailed
report on controls on subject
matter other than internal control
over financial reporting include:
   ļƒ¼   Security
   ļƒ¼   Availability
   ļƒ¼   Processing integrity
   ļƒ¼   Confidentiality
   ļƒ¼   Privacy
How the AICPA Addressed Issues
                                 47
Service Organization Control (SOC) Reports
                                    48
SOC Report Logos
                                   49
For CPAs who provide the
services that result in a SOC 1,
SOC 2 or SOC 3 report

For service organizations that
had a SOC 1, SOC 2 or SOC 3
engagement within the past
year
New Standards and Names
                                           50




            Trust Services Principles and Criteria
SOC 1 Report (restricted use)
                           51

 ā€¢ Report on controls at a service
   organization relevant to a user
   entityā€™s internal control over
   financial reporting
SOC 2 Report (use determined by auditor)
                           52

ā€¢ Report on controls at a
  serviceĀ organization relevant to
  security, availability, processing
  integrity, confidentiality or privacy
SOC 2 Reports ā€“ Type 1 and Type 2
                                 53

ā€¢ Both report on managementā€™s
  description of a service
  organizationā€™s system, andā€¦
   ļƒ¼ Type 1 also reports on suitability of design of
     controls
   ļƒ¼ Type 2 also reports on suitability of design
     and operating effectiveness of controls
Security Assurance - A Better Way
AICPA SOC 2 Type 2 with the CSA CCM
                                                       54
ā€¢The SOC 2 Type 2 Attestation Standard (AT-101) allows for inclusion of
other standards

ā€¢Use SOC 2 Report as the Assurance wrapper for any or all of the following:
    ā€“Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)
    ā€“ISO27001
    ā€“PCI-DSS
    ā€“HITECH
    ā€“NIST/FedRamp

ā€¢One core set of audit work serves as the basis for multiple reports

Recommendation:
The Cloud Security Alliance has determined that for most cloud providers, a
SOC 2 Type 2 attestation examination conducted in accordance with AICPA
standard AT Section 101 (AT 101) utilizing the CSA Cloud Controls Matrix
(CCM) as additional suitable criteria is likely to meet the assurance and
reporting needs of the majority of users of cloud services.
    *This conclusion is supported by the AICPA Technical Practice Aid titled ā€œTIS Section 9530:
    Service Organization Controls Reportsā€ published in November 2011.
About the Cloud Security Alliance

                                                                    55



Global, not-for-profit organisation
Over 40,000 individual members, more than 160 corporate
members, over 60 chapters
Building best practices and a trusted cloud ecosystem
Agile philosophy, rapid development of applied research
  GRC: Balance compliance with risk management
  Reference models: build using existing standards
  Identity: a key foundation of a functioning cloud economy
  Champion interoperability
  Enable innovation
  Advocacy of prudent public policy
ā€œTo promote the use of best practices for providing security assurance within Cloud
Computing, and provide education on the uses of Cloud Computing to help secure
all other forms of computing.ā€




                         Copyright Ā© 2011 Cloud Security Alliance        www.cloudsecurityalliance.o
Questions & Answers                        56


Thank you.

Phil Agcaoili
phil.agcaoili@cox.com
Twitter @hacksec


    www.cloudsecurityalliance.org

    http://www.aicpa.org


                              Promoting Privacy

More Related Content

What's hot

Cloud computing from an institutional perspective
Cloud computing from an institutional perspectiveCloud computing from an institutional perspective
Cloud computing from an institutional perspectiveIgnacio M. Llorente
Ā 
Cloud 9: Nine Reasons to Take the Cloud Seriously_White Paper
Cloud 9: Nine Reasons to Take the Cloud Seriously_White PaperCloud 9: Nine Reasons to Take the Cloud Seriously_White Paper
Cloud 9: Nine Reasons to Take the Cloud Seriously_White PaperNewton Day Uploads
Ā 
[OSDC.tw 2011] The Path to Pass into PaaS -- How We Build the Solution
[OSDC.tw 2011] The Path to Pass into PaaS -- How We Build the Solution[OSDC.tw 2011] The Path to Pass into PaaS -- How We Build the Solution
[OSDC.tw 2011] The Path to Pass into PaaS -- How We Build the SolutionJeff Hung
Ā 
Effective storagemanagementforcloudcomputing
Effective storagemanagementforcloudcomputingEffective storagemanagementforcloudcomputing
Effective storagemanagementforcloudcomputingIBM India Smarter Computing
Ā 
SoftwareGuru 2009 - Cloud Computing
SoftwareGuru 2009 - Cloud ComputingSoftwareGuru 2009 - Cloud Computing
SoftwareGuru 2009 - Cloud ComputingJose Tam
Ā 
Cloud computing NIC 2012
Cloud computing NIC 2012Cloud computing NIC 2012
Cloud computing NIC 2012Kristian Nese
Ā 
Ms Cloud Basics Private Cloud
Ms Cloud Basics Private CloudMs Cloud Basics Private Cloud
Ms Cloud Basics Private CloudStas Kolbin
Ā 
cloud computing
cloud computingcloud computing
cloud computingKrishna Kumar
Ā 
Innovation in cloud computing architectures with open nebula
Innovation in cloud computing architectures with open nebulaInnovation in cloud computing architectures with open nebula
Innovation in cloud computing architectures with open nebulaIgnacio M. Llorente
Ā 
Cloud Computing Webinar
Cloud Computing WebinarCloud Computing Webinar
Cloud Computing WebinarSaif Ahmad
Ā 
Understanding the Cloud Computing Stack
Understanding the Cloud Computing StackUnderstanding the Cloud Computing Stack
Understanding the Cloud Computing StackRackspace
Ā 
Fundamentals of cloud Computing
Fundamentals of cloud ComputingFundamentals of cloud Computing
Fundamentals of cloud Computingnik_053
Ā 
g Eclipse @ Eclipse Summit Europe 2008
g Eclipse @ Eclipse Summit Europe 2008g Eclipse @ Eclipse Summit Europe 2008
g Eclipse @ Eclipse Summit Europe 2008guest462d7
Ā 
Open Nebula OW2 Conference Nov10
Open Nebula OW2 Conference Nov10Open Nebula OW2 Conference Nov10
Open Nebula OW2 Conference Nov10OW2
Ā 
Building a foundation for a high-performance, low cost private cloud
Building a foundation for a  high-performance, low cost  private cloudBuilding a foundation for a  high-performance, low cost  private cloud
Building a foundation for a high-performance, low cost private cloudIBM India Smarter Computing
Ā 
The sky's the limit
The sky's the limitThe sky's the limit
The sky's the limitIvan Zoratti
Ā 
OpenNebula Interoperability and Portability DMTF 2011
OpenNebula Interoperability and Portability  DMTF 2011OpenNebula Interoperability and Portability  DMTF 2011
OpenNebula Interoperability and Portability DMTF 2011Ignacio M. Llorente
Ā 
Is There Such a Thing as a Private Cloud? Citrix Synergy 2011
Is There Such a Thing as a Private Cloud? Citrix Synergy 2011Is There Such a Thing as a Private Cloud? Citrix Synergy 2011
Is There Such a Thing as a Private Cloud? Citrix Synergy 2011Randy Bias
Ā 
Š¢ŠµŠ½Š“ŠµŠ½Ń†ŠøŠø рŠ°Š·Š²ŠøтŠøя сŠ¾Š²Ń€ŠµŠ¼ŠµŠ½Š½Ń‹Ń… Š¦ŠµŠ½Ń‚Ń€Š¾Š² ŠžŠ±Ń€Š°Š±Š¾Ń‚ŠŗŠø Š”Š°Š½Š½Ń‹Ń…
 Š¢ŠµŠ½Š“ŠµŠ½Ń†ŠøŠø рŠ°Š·Š²ŠøтŠøя сŠ¾Š²Ń€ŠµŠ¼ŠµŠ½Š½Ń‹Ń… Š¦ŠµŠ½Ń‚Ń€Š¾Š² ŠžŠ±Ń€Š°Š±Š¾Ń‚ŠŗŠø Š”Š°Š½Š½Ń‹Ń… Š¢ŠµŠ½Š“ŠµŠ½Ń†ŠøŠø рŠ°Š·Š²ŠøтŠøя сŠ¾Š²Ń€ŠµŠ¼ŠµŠ½Š½Ń‹Ń… Š¦ŠµŠ½Ń‚Ń€Š¾Š² ŠžŠ±Ń€Š°Š±Š¾Ń‚ŠŗŠø Š”Š°Š½Š½Ń‹Ń…
Š¢ŠµŠ½Š“ŠµŠ½Ń†ŠøŠø рŠ°Š·Š²ŠøтŠøя сŠ¾Š²Ń€ŠµŠ¼ŠµŠ½Š½Ń‹Ń… Š¦ŠµŠ½Ń‚Ń€Š¾Š² ŠžŠ±Ń€Š°Š±Š¾Ń‚ŠŗŠø Š”Š°Š½Š½Ń‹Ń…Cisco Russia
Ā 

What's hot (19)

Cloud computing from an institutional perspective
Cloud computing from an institutional perspectiveCloud computing from an institutional perspective
Cloud computing from an institutional perspective
Ā 
Cloud 9: Nine Reasons to Take the Cloud Seriously_White Paper
Cloud 9: Nine Reasons to Take the Cloud Seriously_White PaperCloud 9: Nine Reasons to Take the Cloud Seriously_White Paper
Cloud 9: Nine Reasons to Take the Cloud Seriously_White Paper
Ā 
[OSDC.tw 2011] The Path to Pass into PaaS -- How We Build the Solution
[OSDC.tw 2011] The Path to Pass into PaaS -- How We Build the Solution[OSDC.tw 2011] The Path to Pass into PaaS -- How We Build the Solution
[OSDC.tw 2011] The Path to Pass into PaaS -- How We Build the Solution
Ā 
Effective storagemanagementforcloudcomputing
Effective storagemanagementforcloudcomputingEffective storagemanagementforcloudcomputing
Effective storagemanagementforcloudcomputing
Ā 
SoftwareGuru 2009 - Cloud Computing
SoftwareGuru 2009 - Cloud ComputingSoftwareGuru 2009 - Cloud Computing
SoftwareGuru 2009 - Cloud Computing
Ā 
Cloud computing NIC 2012
Cloud computing NIC 2012Cloud computing NIC 2012
Cloud computing NIC 2012
Ā 
Ms Cloud Basics Private Cloud
Ms Cloud Basics Private CloudMs Cloud Basics Private Cloud
Ms Cloud Basics Private Cloud
Ā 
cloud computing
cloud computingcloud computing
cloud computing
Ā 
Innovation in cloud computing architectures with open nebula
Innovation in cloud computing architectures with open nebulaInnovation in cloud computing architectures with open nebula
Innovation in cloud computing architectures with open nebula
Ā 
Cloud Computing Webinar
Cloud Computing WebinarCloud Computing Webinar
Cloud Computing Webinar
Ā 
Understanding the Cloud Computing Stack
Understanding the Cloud Computing StackUnderstanding the Cloud Computing Stack
Understanding the Cloud Computing Stack
Ā 
Fundamentals of cloud Computing
Fundamentals of cloud ComputingFundamentals of cloud Computing
Fundamentals of cloud Computing
Ā 
g Eclipse @ Eclipse Summit Europe 2008
g Eclipse @ Eclipse Summit Europe 2008g Eclipse @ Eclipse Summit Europe 2008
g Eclipse @ Eclipse Summit Europe 2008
Ā 
Open Nebula OW2 Conference Nov10
Open Nebula OW2 Conference Nov10Open Nebula OW2 Conference Nov10
Open Nebula OW2 Conference Nov10
Ā 
Building a foundation for a high-performance, low cost private cloud
Building a foundation for a  high-performance, low cost  private cloudBuilding a foundation for a  high-performance, low cost  private cloud
Building a foundation for a high-performance, low cost private cloud
Ā 
The sky's the limit
The sky's the limitThe sky's the limit
The sky's the limit
Ā 
OpenNebula Interoperability and Portability DMTF 2011
OpenNebula Interoperability and Portability  DMTF 2011OpenNebula Interoperability and Portability  DMTF 2011
OpenNebula Interoperability and Portability DMTF 2011
Ā 
Is There Such a Thing as a Private Cloud? Citrix Synergy 2011
Is There Such a Thing as a Private Cloud? Citrix Synergy 2011Is There Such a Thing as a Private Cloud? Citrix Synergy 2011
Is There Such a Thing as a Private Cloud? Citrix Synergy 2011
Ā 
Š¢ŠµŠ½Š“ŠµŠ½Ń†ŠøŠø рŠ°Š·Š²ŠøтŠøя сŠ¾Š²Ń€ŠµŠ¼ŠµŠ½Š½Ń‹Ń… Š¦ŠµŠ½Ń‚Ń€Š¾Š² ŠžŠ±Ń€Š°Š±Š¾Ń‚ŠŗŠø Š”Š°Š½Š½Ń‹Ń…
 Š¢ŠµŠ½Š“ŠµŠ½Ń†ŠøŠø рŠ°Š·Š²ŠøтŠøя сŠ¾Š²Ń€ŠµŠ¼ŠµŠ½Š½Ń‹Ń… Š¦ŠµŠ½Ń‚Ń€Š¾Š² ŠžŠ±Ń€Š°Š±Š¾Ń‚ŠŗŠø Š”Š°Š½Š½Ń‹Ń… Š¢ŠµŠ½Š“ŠµŠ½Ń†ŠøŠø рŠ°Š·Š²ŠøтŠøя сŠ¾Š²Ń€ŠµŠ¼ŠµŠ½Š½Ń‹Ń… Š¦ŠµŠ½Ń‚Ń€Š¾Š² ŠžŠ±Ń€Š°Š±Š¾Ń‚ŠŗŠø Š”Š°Š½Š½Ń‹Ń…
Š¢ŠµŠ½Š“ŠµŠ½Ń†ŠøŠø рŠ°Š·Š²ŠøтŠøя сŠ¾Š²Ń€ŠµŠ¼ŠµŠ½Š½Ń‹Ń… Š¦ŠµŠ½Ń‚Ń€Š¾Š² ŠžŠ±Ń€Š°Š±Š¾Ń‚ŠŗŠø Š”Š°Š½Š½Ń‹Ń…
Ā 

Viewers also liked

Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Phil Agcaoili
Ā 
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...Phil Agcaoili
Ā 
2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?Phil Agcaoili
Ā 
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Phil Agcaoili
Ā 
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...Phil Agcaoili
Ā 
2011 Digital Summit - Not So Cloudy - Agcaoili
2011 Digital Summit - Not So Cloudy - Agcaoili2011 Digital Summit - Not So Cloudy - Agcaoili
2011 Digital Summit - Not So Cloudy - AgcaoiliPhil Agcaoili
Ā 
OWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter MeetingOWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter MeetingPhil Agcaoili
Ā 
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterPhil Agcaoili
Ā 
Fearing the cloud: why the life sciences shouldn't fret
Fearing the cloud: why the life sciences shouldn't fretFearing the cloud: why the life sciences shouldn't fret
Fearing the cloud: why the life sciences shouldn't fretCornerstone OnDemand
Ā 
Swe cs external 25112013 services
Swe cs external 25112013   servicesSwe cs external 25112013   services
Swe cs external 25112013 servicesAfiman Abdul Rahman
Ā 
Stephon Grey Profile 2015
Stephon Grey Profile 2015Stephon Grey Profile 2015
Stephon Grey Profile 2015Stephon Grey
Ā 
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughContinuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughFraudBusters
Ā 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applicationskanimozhin
Ā 
Audit standards for Federal PKI Certification Authorities using PKI
Audit standards for Federal PKI Certification Authorities using PKIAudit standards for Federal PKI Certification Authorities using PKI
Audit standards for Federal PKI Certification Authorities using PKIDavid Sweigert
Ā 
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...Oracle
Ā 
SOC 2/SOC 3 Whitepaper
SOC 2/SOC 3 WhitepaperSOC 2/SOC 3 Whitepaper
SOC 2/SOC 3 WhitepaperDTIMMERMAN
Ā 
Federal government-of-nigeria-ncap-april-2013
Federal government-of-nigeria-ncap-april-2013Federal government-of-nigeria-ncap-april-2013
Federal government-of-nigeria-ncap-april-2013Perkins Abaje
Ā 
Baigiang kiemtoan english
Baigiang kiemtoan englishBaigiang kiemtoan english
Baigiang kiemtoan englishThanh Phuong Pham
Ā 

Viewers also liked (20)

Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say?
Ā 
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...
Ā 
2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?
Ā 
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Ā 
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...2013 Democratization Of Technology   How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
Ā 
2011 Digital Summit - Not So Cloudy - Agcaoili
2011 Digital Summit - Not So Cloudy - Agcaoili2011 Digital Summit - Not So Cloudy - Agcaoili
2011 Digital Summit - Not So Cloudy - Agcaoili
Ā 
OWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter MeetingOWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter Meeting
Ā 
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
Ā 
Fearing the cloud: why the life sciences shouldn't fret
Fearing the cloud: why the life sciences shouldn't fretFearing the cloud: why the life sciences shouldn't fret
Fearing the cloud: why the life sciences shouldn't fret
Ā 
Swe cs external 25112013 services
Swe cs external 25112013   servicesSwe cs external 25112013   services
Swe cs external 25112013 services
Ā 
Stephon Grey Profile 2015
Stephon Grey Profile 2015Stephon Grey Profile 2015
Stephon Grey Profile 2015
Ā 
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughContinuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Ā 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
Ā 
Audit standards for Federal PKI Certification Authorities using PKI
Audit standards for Federal PKI Certification Authorities using PKIAudit standards for Federal PKI Certification Authorities using PKI
Audit standards for Federal PKI Certification Authorities using PKI
Ā 
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Ā 
SOC 2/SOC 3 Whitepaper
SOC 2/SOC 3 WhitepaperSOC 2/SOC 3 Whitepaper
SOC 2/SOC 3 Whitepaper
Ā 
Federal government-of-nigeria-ncap-april-2013
Federal government-of-nigeria-ncap-april-2013Federal government-of-nigeria-ncap-april-2013
Federal government-of-nigeria-ncap-april-2013
Ā 
Ifc deloitte
Ifc deloitteIfc deloitte
Ifc deloitte
Ā 
Baigiang kiemtoan english
Baigiang kiemtoan englishBaigiang kiemtoan english
Baigiang kiemtoan english
Ā 
Information Technology Portfolio
Information Technology PortfolioInformation Technology Portfolio
Information Technology Portfolio
Ā 

Similar to IAPP Atlanta Chapter Meeting 2013 February

Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy ciscoOpenSourceCamp
Ā 
Business Of Cloud Computing Workshop Final
Business Of Cloud Computing Workshop FinalBusiness Of Cloud Computing Workshop Final
Business Of Cloud Computing Workshop FinalMarc Crudgington, MBA
Ā 
Gis In The Cloud
Gis In The CloudGis In The Cloud
Gis In The Cloudfn028791
Ā 
GIS in the Cloud
GIS in the CloudGIS in the Cloud
GIS in the CloudEsri
Ā 
Extending Your Infrastructure & Data to the Cloud
Extending Your Infrastructure & Data to the CloudExtending Your Infrastructure & Data to the Cloud
Extending Your Infrastructure & Data to the CloudMargaret Dawson
Ā 
Dell and OpenStack
Dell and OpenStackDell and OpenStack
Dell and OpenStackeNovance
Ā 
Niko Nelissen - Sun Microsystems - Keynote 'What's next in the Cloud?' CloudC...
Niko Nelissen - Sun Microsystems - Keynote 'What's next in the Cloud?' CloudC...Niko Nelissen - Sun Microsystems - Keynote 'What's next in the Cloud?' CloudC...
Niko Nelissen - Sun Microsystems - Keynote 'What's next in the Cloud?' CloudC...CloudAngels
Ā 
Cloud Computing for Beginners
Cloud Computing for Beginners Cloud Computing for Beginners
Cloud Computing for Beginners Suman Singh
Ā 
Kussu.ppt
Kussu.pptKussu.ppt
Kussu.pptkusumjawla
Ā 
Cloud Computing and Eclipse technology - how does it fit together?
Cloud Computing and Eclipse technology - how does it fit together?Cloud Computing and Eclipse technology - how does it fit together?
Cloud Computing and Eclipse technology - how does it fit together?Markus Knauer
Ā 
20111206 Cloud Expo Nl Jaarbeurs 7 Dec
20111206 Cloud Expo Nl Jaarbeurs 7 Dec20111206 Cloud Expo Nl Jaarbeurs 7 Dec
20111206 Cloud Expo Nl Jaarbeurs 7 DecTheo Slaats
Ā 
The unified data center for cloud david yen
The unified data center for cloud david yenThe unified data center for cloud david yen
The unified data center for cloud david yendeepersnet
Ā 
A Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-CloudA Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-CloudGovCloud Network
Ā 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaAsheem Chandna
Ā 
Cloud computing
Cloud computingCloud computing
Cloud computingSnehal Hedau
Ā 

Similar to IAPP Atlanta Chapter Meeting 2013 February (20)

Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy cisco
Ā 
Business Of Cloud Computing Workshop Final
Business Of Cloud Computing Workshop FinalBusiness Of Cloud Computing Workshop Final
Business Of Cloud Computing Workshop Final
Ā 
Gis In The Cloud
Gis In The CloudGis In The Cloud
Gis In The Cloud
Ā 
GIS in the Cloud
GIS in the CloudGIS in the Cloud
GIS in the Cloud
Ā 
Extending Your Infrastructure & Data to the Cloud
Extending Your Infrastructure & Data to the CloudExtending Your Infrastructure & Data to the Cloud
Extending Your Infrastructure & Data to the Cloud
Ā 
Dell and OpenStack
Dell and OpenStackDell and OpenStack
Dell and OpenStack
Ā 
Niko Nelissen - Sun Microsystems - Keynote 'What's next in the Cloud?' CloudC...
Niko Nelissen - Sun Microsystems - Keynote 'What's next in the Cloud?' CloudC...Niko Nelissen - Sun Microsystems - Keynote 'What's next in the Cloud?' CloudC...
Niko Nelissen - Sun Microsystems - Keynote 'What's next in the Cloud?' CloudC...
Ā 
Cloud Foundry et le Cloud vu par VMware
Cloud Foundry et le Cloud vu par VMwareCloud Foundry et le Cloud vu par VMware
Cloud Foundry et le Cloud vu par VMware
Ā 
Cloud Computing for Beginners
Cloud Computing for Beginners Cloud Computing for Beginners
Cloud Computing for Beginners
Ā 
Kussu.ppt
Kussu.pptKussu.ppt
Kussu.ppt
Ā 
Cloud Computing and Eclipse technology - how does it fit together?
Cloud Computing and Eclipse technology - how does it fit together?Cloud Computing and Eclipse technology - how does it fit together?
Cloud Computing and Eclipse technology - how does it fit together?
Ā 
Cloud computing
Cloud computingCloud computing
Cloud computing
Ā 
20111206 Cloud Expo Nl Jaarbeurs 7 Dec
20111206 Cloud Expo Nl Jaarbeurs 7 Dec20111206 Cloud Expo Nl Jaarbeurs 7 Dec
20111206 Cloud Expo Nl Jaarbeurs 7 Dec
Ā 
Cloud computing
Cloud computingCloud computing
Cloud computing
Ā 
Cloud computing
Cloud computingCloud computing
Cloud computing
Ā 
The unified data center for cloud david yen
The unified data center for cloud david yenThe unified data center for cloud david yen
The unified data center for cloud david yen
Ā 
A Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-CloudA Hitchhiker's Guide to the Inter-Cloud
A Hitchhiker's Guide to the Inter-Cloud
Ā 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - Chandna
Ā 
PIM4Cloud
PIM4CloudPIM4Cloud
PIM4Cloud
Ā 
Cloud computing
Cloud computingCloud computing
Cloud computing
Ā 

More from Phil Agcaoili

Cybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the NoiseCybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the NoisePhil Agcaoili
Ā 
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the MinePhil Agcaoili
Ā 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philAPhil Agcaoili
Ā 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingPhil Agcaoili
Ā 
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Phil Agcaoili
Ā 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
Ā 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Phil Agcaoili
Ā 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Phil Agcaoili
Ā 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidPhil Agcaoili
Ā 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...Phil Agcaoili
Ā 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Phil Agcaoili
Ā 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityPhil Agcaoili
Ā 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13Phil Agcaoili
Ā 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityPhil Agcaoili
Ā 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsPhil Agcaoili
Ā 
Moneysec - Moneyball for Security
Moneysec - Moneyball for SecurityMoneysec - Moneyball for Security
Moneysec - Moneyball for SecurityPhil Agcaoili
Ā 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final ReportPhil Agcaoili
Ā 

More from Phil Agcaoili (17)

Cybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the NoiseCybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the Noise
Ā 
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
Ā 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
Ā 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
Ā 
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Ā 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
Ā 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Ā 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Ā 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
Ā 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
Ā 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Ā 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
Ā 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
Ā 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber Security
Ā 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Ā 
Moneysec - Moneyball for Security
Moneysec - Moneyball for SecurityMoneysec - Moneyball for Security
Moneysec - Moneyball for Security
Ā 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
Ā 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
Ā 
šŸ¬ The future of MySQL is Postgres šŸ˜
šŸ¬  The future of MySQL is Postgres   šŸ˜šŸ¬  The future of MySQL is Postgres   šŸ˜
šŸ¬ The future of MySQL is Postgres šŸ˜RTylerCroy
Ā 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
Ā 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
Ā 
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...Alan Dix
Ā 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
Ā 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
Ā 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
Ā 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
Ā 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
Ā 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
Ā 
Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024BookNet Canada
Ā 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...gurkirankumar98700
Ā 
WhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
Ā 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
Ā 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
Ā 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
Ā 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
Ā 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
Ā 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
Ā 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Ā 
šŸ¬ The future of MySQL is Postgres šŸ˜
šŸ¬  The future of MySQL is Postgres   šŸ˜šŸ¬  The future of MySQL is Postgres   šŸ˜
šŸ¬ The future of MySQL is Postgres šŸ˜
Ā 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Ā 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Ā 
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...
Ā 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Ā 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Ā 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Ā 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
Ā 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Ā 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Ā 
Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
Ā 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...
Ā 
WhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure service
Ā 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Ā 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Ā 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Ā 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Ā 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
Ā 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Ā 

IAPP Atlanta Chapter Meeting 2013 February

  • 1. 1 IAPP Atlanta Chapter February 22, 2013 Cloud Assurance Basics Phil Agcaoili CISO, Cox Communications Founding Member, Cloud Security Alliance (CSA) Co-Founder and Co-Author, CSA Cloud Controls Matrix (CCM) Co-Founder Security, Trust, & Assurance Registry (STAR) and GRC Stack
  • 2. 2 agenda ā€¢ Intro to cloud computing ā€¢ Legal and privacy concerns to consider ā€¢ Latest developments of cloud security and assurance standards
  • 3. 3 Intro to cloud computing
  • 4. What Is Cloud Computing? 4 ā€¢ The ā€œcloudā€ is a metaphor for the Internet ā€“ Leverages the connectivity of the Internet to optimize the utility of computing ā€¢ It is not new! ā€“ Search is a cloud application (Google, Yahoo, Altavista) ā€“ Internet-based email services are cloud applications (Gmail, Yahoo! Mail, Hotmail, AOL Mail) ā€“ Social networking sites are cloud applications (Facebook, MySpace, Forums) ā€“ Similar to time-sharing and service bureau services from the mainframe days, or ASPā€™s from the 90ā€™s ā€¢ Accessible anywhere with Internet access ā€“ There are public, private, managed and hybrid clouds
  • 5. The Consumerā€™s View of Cloud 5 ...Everything is Cloud Presentation_ID2008 Cisco Systems, Inc. All rights reserved. Confidential Ā© Cisco
  • 6. Evolution Over The Years 6 Cloud Computing with pay as you go model, leveraging virtualization for data center efficiencies and faster networks Software as a Service (SaaS) model with multi- Adoption tenant hosting of applications ASP (Application Service John McCarthy Provider) model with proposed 'computer time- single tenant hosting of sharing technology' to be applications sold through utility business model (like electricity) in a lecture at MIT 1961 Mid 90ā€™s Early 00ā€™s Late 00ā€™s Time
  • 7. The Technical View of Cloud 7 Presentation_ID2008 Cisco Systems, Inc. All rights reserved. Confidential Ā© Cisco
  • 8. NIST Cloud Deployment Models 8 Application Applications at Scale (SaaS) (End users) Platform Execution Platforms at as a Scale Service (Developers) Infrastructu Infrastructure at Scale re (System Administrators) as a Service Enabling Cloud Service Delivery at Technology Scale (Public / Private Cloud Providers) Presentation_ID2008 Cisco Systems, Inc. All rights reserved. Confidential Ā© Cisco
  • 9. Cloud Model :: Infrastructure as a Service (IaaS) 9
  • 10. Cloud Model :: Platform as a Service (PaaS) 10
  • 11. Cloud Model :: Software as a Service (SaaS) 11
  • 12. NIST Cloud Deployment Models 12 Cloud infrastructure made Public available to the general Cloud public. Cloud infrastructure operated Private solely for an organization. Cloud Cloud infrastructure composed Hybrid of two or more clouds that Cloud interoperate or federate through technology Cloud infrastructure shared by Community several organizations and Cloud supporting a specific community ā€¦ and one other Cloud services that simulate Virtual the private cloud experience in Private public cloud infrastructure Cloud Presentation_ID2008 Cisco Systems, Inc. All rights reserved. Confidential Ā© Cisco
  • 13. Enterprise Deployment Models Distinguishing Between Ownership and 13 Control Internal Resources External Resources All cloud All cloud Ownership resources resources owned by or owned by dedicated to Cloud Hybrid providers; enterprise used by many Interoperabil customers ity and portability Private Cloud Public Cloud among Public and/or Cloud Private Cloud Cloud Control definition/systems definition/ governance governance controlled controlled by by provider enterprise Presentation_ID2008 Cisco Systems, Inc. All rights reserved. Confidential Ā© Cisco
  • 14. What This Means To Security 14 The lower down the stack the Salesforce - Cloud provider stops, the SaaS more security you are tactically responsible for implementing & managing yourself. Google AppEngine - PaaS Amazon EC2 - IaaS
  • 16. Be Prepared for Change 16 ā€¢ Cloud industry is immature and growing rapidly ā€¢ New players will rapidly emerge to fill new market niches ā€¢ Consolidation of the industry at some point is inevitable ā€“ You may not be as comfortable with new entity ā€¢ Google, Amazon, IBM, Microsoft, Dell, HP, Cisco, CSC, and Verizon all active in this area ā€“ Big players will create standards for security and governance ā€¢ Cloud computing is disruptive to existing business models and IT practices ā€“ Disruptive technologies attract players who may not be around for the long term
  • 17. Types of Issues 17 ā€¢ Location (where is your data; what law governs?) ā€¢ Operational (including service levels and security) ā€¢ Legislation/Regulatory (including privacy) ā€¢ Third-party contractual limitations on use of cloud ā€¢ Security ā€¢ Investigative/Litigation (eDiscovery) ā€¢ Risk allocation/risk mitigation/insurance
  • 18. Location Issues 18 ā€¢ Where will your data be located? ā€“ The cloud may be the ultimate form of globalization ā€¢ What law governs? ā€“ You may or may not be able to control this by contract as the law in some countries can trump contractual provisions ā€“ State law is becoming increasingly relevant ā€“ Complying with a patchwork of federal and state privacy laws ā€¢ Storing data in certain regions may not be acceptable to your customers, especially the government
  • 19. Operational Issues 19 ā€¢ Vendor lock-in issues ā€“ Will you be bound to a certain application; platform; operating system? ā€“ Some critics, such as Richard Stallman, have called it ā€œa trap aimed at forcing more people to buy into locked, proprietary systems that will cost them more and more over timeā€ ā€¢ Can you transfer data and applications to and from the cloud?
  • 20. Operational Issues 20 ā€¢ Backup/data restoration ā€¢ Disaster recovery ā€¢ Acceptable service levels ā€¢ What do you do if the Internet crashes? ā€“ How is that risk allocated by contract? ā€¢ Data retention issues ā€“ There many legal and tax reasons that company must retain data longer than cloud vendor is prepared to do so
  • 21. Regulatory/Governance Issues 21 ā€¢ The more of these issues you have, the slower you will move to cloud computing ā€“ Early growth in cloud computing will come from small and medium sized businesses and give them a competitive advantage ā€“ Portion of cost savings will have to be reinvested into increased scrutiny of security capabilities of cloud providers ā€¢ Some regions, such as the EU, have stringent rules concerning moving certain types of data across borders ā€¢ Cloud computing not regulated ā€“yet
  • 22. Regulatory/Governance Issues 22 ā€¢ Patriot Act/UK Regulation of Investigatory Powers Act ā€¢ Stored Communications Act (part of ECPA) ā€¢ National Security Letters (may not even know of investigation) ā€¢ PCI (credit card information) ā€¢ HIPAA (health-related information) ā€¢ GLB (financial services industry) ā€¢ FTC and state privacy laws ā€¢ ITARS, EARS, other export or trade restrictions will impact where data can be stored and who can store it ā€¢ Video rental records ā€¢ Fair Credit Reporting Act ā€¢ Violence Against Women Act ā€¢ Cable company customer records
  • 23. Contracts Will Be The Key Legal Enforcement Mechanism 23 ā€¢ Privileged user access ā€“ Who has access to data and their backgrounds ā€¢ Regulatory compliance ā€“ Vendor must be willing to undergo audits and security certifications ā€¢ Data location ā€“ Can you control the physical location of your data? ā€¢ Security ā€“ Implementation is a technical matter; responsibility is a legal one
  • 24. Key Contractual Issues 24 ā€¢ Data segregation ā€“ Use of encryption to protect data ā€“a sometimes tricky issue ā€¢ Recovery ā€“ What happens to your data and apps in the event of a disaster? ā€“ You should have test procedures in place ā€¢ Long-term viability ā€“ What happens to data and apps if company goes out of business? ā€¢ Investigative support ā€“ Will vendor investigate illegal or inappropriate activity? ā€¢ What happens in the event of a security breach?
  • 25. Security Issues 25 ā€¢ Physical security ā€“ Physical location of data centers; protection of data centers against disaster and intrusion ā€¢ Operational security ā€“ Who has access to facilities/applications/data? ā€“ Will you get a ā€œprivate cloudā€ or a service delivered more on a ā€œutilityā€ model? ā€¢ Programmatic security ā€“ Software controls that limit vendor and other access to data and applications (firewalls; encryption; access and rights management) ā€“ Encryption accidents can make data unusable
  • 26. Investigative/Litigation Issues 26 ā€¢ Third party access ā€“ Subpoenas ā€¢ You may not even know about them if vendor gets the subpoena ā€“ Criminal/national security investigations ā€“ Search warrants; possible seizures ā€¢ eDiscovery ā€“ How are document holds enforced; metadata protected; information searched for and retrieved? ā€¢ You must have clear understanding of what cloud provider will do in response to legal requests for information
  • 27. Intellectual Property Issues 27 ā€¢ The big issue is trade secret protection ā€“ If third parties have access to trade secret information, that could destroy the legal protection of trade secrets ā€“ This can be ameliorated by appropriate contractual non- disclosure provisions ā€¢ Same concern for attorney-client privileged information
  • 28. Risk Allocation/Management ā€¢ No benchmarks today for service levels 28 ā€¢ No cloud vendor can offer a 100% guarantee ā€“ The most trusted and reliable vendor can still fail ā€“ Should replicate data and application availability at multiple sites ā€“ Should you escrow data or application code? ā€¢ A premium will be charged based on the degree of accountability demanded ā€¢ Responsibility of customer to determine if it is comfortable with risk of putting service in the cloud ā€¢ Many publicly available cloud computing contracts limit liability of hosting provider to a level that is not in line with the potential risk ā€¢ Cloud computing contracts resemble typical software licenses, although potential risk is much higher
  • 29. Insurance 29 ā€¢ Will business interruption insurance provide coverage if your business goes down because of problem at cloud vendor? ā€¢ Do Commercial General Liability (CGL) or other types of liability coverage handle claims that arise from privacy breaches or other events at the cloud level? ā€¢ Are you covered if your cloud vendor gets hacked?
  • 30. Checklist of Things to Consider 30 ā€¢ Financial viability of cloud provider ā€¢ Plan for bankruptcy or unexpected termination of the relationship and orderly return of disposal of data/applications ā€“ Vendor will want right to dispose of your data if you donā€™t pay ā€¢ Contract should include agreement as to desired service level and ability to monitor it ā€¢ Negotiate restrictions on secondary uses of data and who at the vendor has access to sensitive data ā€¢ Understand cloud providerā€™s information security management systems
  • 31. Checklist of Things to Consider ā€¢ Negotiate roles for response to eDiscovery requests 31 ā€¢ Ensure that you have ability to audit on demand and regulatory and business needs require ā€“ Companies subject to information security standards such as ISO 27001, must pass to subs same obligation ā€¢ Make sure that cloud provider policies and processes for data retention and destruction are acceptable ā€¢ Provide for regular backup and recovery tests ā€¢ Consider data portability application lock-in concerns ā€¢ Understand roles and notification responsibilities in event of a breach
  • 32. Checklist of Things to Consider 32 ā€¢ Data encryption is very good for security, but potentially risky; make sure you understand it ā€“ Will you still be able to de-crypt data years later? ā€¢ Understand and negotiate where your data will be stored, what law controls and possible restrictions on cross-border transfers ā€¢ Third-party access issues ā€¢ Consider legal and practical liability for force majeure events ā€“ Must be part of disaster recovery and business continuity plan ā€¢ There is no substitute for careful due diligence
  • 33. 33 Latest developments in cloud security assurance CSA Cloud Controls Matrix (CCM) AICPA SOC Reports CSA Open Certification Framework (OCF)
  • 34. 34
  • 35. 35 Our research includes fundamental projects needed to define and implement trust within the future of information technology CSA continues to be aggressive in producing critical research, education and tools 22 Active Work Groups and 10 in the pipeline Copyright Ā© 2011 Cloud Security Alliance www.cloudsecurityalliance.org Copyright Ā© 2012 Cloud Security Alliance
  • 36. 36 GRC Stack Family of 4 research projects Cloud Controls Matrix (CCM) Consensus Assessments Initiative (CAI) Cloud Audit Cloud Trust Protocol (CTP) Private, Private, Community & Community & Control Public Clouds Public Clouds Provider Requirement Assertion s s
  • 37. 37 ā€¢ Controls derived from guidance ā€¢ Mapped to familiar frameworks: ISO 27001, COBIT, PCI, HIPAA, FISMA, FedRAMP, etc. ā€¢ Rated as applicable to S-P-I ā€¢ Customer vs. Provider role ā€¢ Help bridge the ā€œcloud gapā€ for IT & IT auditors
  • 38. 38 ā€¢ Research tools and processes to perform shared assessments of cloud providers ā€¢ Integrated with Controls Matrix ā€¢ Version 1 CAI Questionnaire released Oct 2010, approximately 140 provider questions to identify presence of security controls or practices ā€¢ Use to assess cloud providers today, procurement negotiation, contract inclusion, quantify SLAs
  • 39. 39 ā€¢ CSA STAR (Security, Trust and Assurance Registry) ā€“ Public Registry of Cloud Provider self assessments ā€“ Based on Consensus Assessments Initiative Questionnaire ā€¢ Provider may substitute documented Cloud Controls Matrix compliance ā€“ Voluntary industry action promoting transparency ā€“ Free market competition to provide quality assessments ā€¢ Provider may elect to provide assessments from third parties
  • 40. Security Assurance - A Better Way CSA Open Certification Framework (OCF) 40 The CSA Open Certification Framework is an industry initiative to allow global, accredited, trusted certification of cloud providers. The CSA Open Certification Framework is a program for flexible, incremental and multi-layered cloud provider certification according to the Cloud Security Allianceā€™s industry leading security guidance and control objectives. The program will integrate with popular third-party assessment and attestation statements developed within the public accounting community to avoid duplication of effort and cost. ~Jim Reavis & Daniele Catteddu; CSA~ Copyright Ā© 2011 Cloud Security Alliance www.cloudsecurityalliance.o
  • 41. Security Assurance - A Better Way CSA Open Certification Framework (OCF) OCF Level 1: CSA STAR Registry 41 CSA STAR (Security, Trust and Assurance Registry) Public Registry of Cloud Provider self assessments Based on Consensus Assessments Initiative Questionnaire (CAIQ) Provider may substitute documented Cloud Controls Matrix compliance Voluntary industry action promoting transparency Free market competition to provide quality assessments Provider may elect to provide assessments from third parties Available since October 2011 Copyright Ā© 2011 Cloud Security Alliance www.cloudsecurityalliance.or
  • 42. OCF: The structure 42 The open certification framework is structured on 3 LEVELs of TRUST, each one of them providing an incremental level of visibility and transparency into the operations of the Cloud Service Provider and a higher level of assurance to the Cloud consumer. Copyright Ā© 2011 Cloud Security Alliance www.cloudsecurityalliance.o
  • 44. AICPA SAS No. 70, Service Organizations 44 ā€¢A standard for reporting on a service organizationā€™s controls affecting user entities' financial statements. ā€¢Only for use by service organization management, existing user entities, and their auditors. ā€¢Replaced by SSAE 16 SOC 1 in 2011
  • 45. SAS No. 70, Service Organizations 45 Misuse: ā€¢ā€œSAS 70 Certifiedā€ or ā€œSAS 70 Compliantā€ ā€¢Controls related to subject matter other than internal control over financial reporting ā€¢Made report public
  • 46. Other Service Organization Control Reports (SOC) 46 Marketplace demand for detailed report on controls on subject matter other than internal control over financial reporting include: ļƒ¼ Security ļƒ¼ Availability ļƒ¼ Processing integrity ļƒ¼ Confidentiality ļƒ¼ Privacy
  • 47. How the AICPA Addressed Issues 47
  • 48. Service Organization Control (SOC) Reports 48
  • 49. SOC Report Logos 49 For CPAs who provide the services that result in a SOC 1, SOC 2 or SOC 3 report For service organizations that had a SOC 1, SOC 2 or SOC 3 engagement within the past year
  • 50. New Standards and Names 50 Trust Services Principles and Criteria
  • 51. SOC 1 Report (restricted use) 51 ā€¢ Report on controls at a service organization relevant to a user entityā€™s internal control over financial reporting
  • 52. SOC 2 Report (use determined by auditor) 52 ā€¢ Report on controls at a serviceĀ organization relevant to security, availability, processing integrity, confidentiality or privacy
  • 53. SOC 2 Reports ā€“ Type 1 and Type 2 53 ā€¢ Both report on managementā€™s description of a service organizationā€™s system, andā€¦ ļƒ¼ Type 1 also reports on suitability of design of controls ļƒ¼ Type 2 also reports on suitability of design and operating effectiveness of controls
  • 54. Security Assurance - A Better Way AICPA SOC 2 Type 2 with the CSA CCM 54 ā€¢The SOC 2 Type 2 Attestation Standard (AT-101) allows for inclusion of other standards ā€¢Use SOC 2 Report as the Assurance wrapper for any or all of the following: ā€“Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) ā€“ISO27001 ā€“PCI-DSS ā€“HITECH ā€“NIST/FedRamp ā€¢One core set of audit work serves as the basis for multiple reports Recommendation: The Cloud Security Alliance has determined that for most cloud providers, a SOC 2 Type 2 attestation examination conducted in accordance with AICPA standard AT Section 101 (AT 101) utilizing the CSA Cloud Controls Matrix (CCM) as additional suitable criteria is likely to meet the assurance and reporting needs of the majority of users of cloud services. *This conclusion is supported by the AICPA Technical Practice Aid titled ā€œTIS Section 9530: Service Organization Controls Reportsā€ published in November 2011.
  • 55. About the Cloud Security Alliance 55 Global, not-for-profit organisation Over 40,000 individual members, more than 160 corporate members, over 60 chapters Building best practices and a trusted cloud ecosystem Agile philosophy, rapid development of applied research GRC: Balance compliance with risk management Reference models: build using existing standards Identity: a key foundation of a functioning cloud economy Champion interoperability Enable innovation Advocacy of prudent public policy ā€œTo promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.ā€ Copyright Ā© 2011 Cloud Security Alliance www.cloudsecurityalliance.o
  • 56. Questions & Answers 56 Thank you. Phil Agcaoili phil.agcaoili@cox.com Twitter @hacksec www.cloudsecurityalliance.org http://www.aicpa.org Promoting Privacy

Editor's Notes

  1. There are 4 major categories in the Cloud Computing value chain. These are the target workloads and user base for each category The first category is Software as a Service : This is Applications services delivered over the network on a subscription basis. Cisco WebEx, Salesforce, Microsoft and Google are perhaps the biggest providers here Then there is Platform as a Service which is Software development frameworks and components delivered over the network on a pay-as-you-go basis. Examples of this are; Google Apps Engine, Amazon Web Services and Microsoft Azure The next category is Infrastructure as a Service where compute, network and storage delivered over the network on a pay-as-you-go basis. Amazon pioneered this with AWS (Amazon Web Service) and now IBM and most of the managed hosting market are entrants here also. The approach we are taking is to enable service providers to move into this areaā€”we are not building our own Infrastructure as a Service offering for the general market. And of course, there is an IT foundation that has to keep all this goingā€”Cisco intends to be the leading provider of enabling technology to both the service provider and enterprise markets
  2. The NIST also breaks down cloud computing deployment models with four categories: Public clouds deliver computing services (SaaS, PaaS or IaaS) to the general market over the Internet. These are services where you can browse to a web site, enter a payment method, and begin using the service through your browser, along with all of the other customers of the service. Generally the cloud provider defines the user interfaces and architectures for these clouds. Private clouds deliver the NIST essential characteristics to a single organization, usually through either wholly owned or dedicated leased infrastructure. Hybrid clouds federate two or more cloud environments together, usually through both management and network interfaces. Virtual private cloud is actually a mechanism by which a private cloud can be simulated in public cloud infrastructure. Often, this looks like VPN connectivity from the corporate network into the public cloud providersā€™ data centers.
  3. Ultimately, however, Cisco believes that these distinctions will be blurred by technologies that allow interoperability, federation and portability between combinations of public and private cloud environments. These combined clouds are typically known as ā€œHybrid Cloudsā€
  4. Under Statement on Auditing Standard (SAS) 70 , published in 1992, CPAs were able to produce a report that would be an auditor-to-auditor communication (as well as one used by management of the service organization, existing user entities and their auditors) on either the design or design and effectiveness of a user organizationā€™s financial statement controls that have been outsourced to a service organization. With the growth in new technologies , global business opportunities and increased outsourcing , SAS 70 quickly attracted marketplace attention . 09/12/2012
  5. Unfortunately, some organizations misinterpreted SAS 70 and tried to expand its use to indicate that they had been ā€œSAS 70 certifiedā€ or were ā€œSAS 70 compliant.ā€ While SAS 70 focused only on financial controls at outsourced operations that have an impact on a companyā€™s financial statements, organizations used these terms incorrectly to imply that controls over non-financial subject matters also were covered. In addition, some service organizations mistakenly made the report available to the public ā€“ particularly potential customers ā€“ when it was never meant for that purpose . 09/12/2012
  6. Based on these misuses of SAS70 reports, it became clear that there was a need for a detailed report that was based on an examination of subject matter other than internal control over financial reporting. The emergence and growth of cloud computing , increased outsourcing of certain functions, and privacy concerns only further elevated this issue. The subjects identified , which are considered part of compliance and operations , were a service organizationā€™s security, availability, processing integrity, confidentiality and privacy. We will discuss these areas in more detail later. 09/12/2012
  7. So, how did the AICPA address the marketplace demand? 1. Split SAS70 and replaced with 2 new standards , Statement on Standards for Attestation Engagements (SSAE) 16 for service auditors , which is effective now, and a new SAS for user auditors (i.e. how to use a SOC report) , which is effective for calendar year 2012 financial statement audits. This User Auditor standard is now incorporated into the Clarified Auditing Standards and can be found in AU-C 402 (Audit Considerations Relating to an Entity Using a Service Organization). Although written for auditors of entities that use 3 rd party service providers, the considerations in this standard are a relevant reference for Management as they oversee vendor relationships on their own internal control environment. SSAE 16 , Reporting on Controls at a Service Organization, applies when an entity outsources a business task or function to another entity (usually one that specializes in that task or function) and the data resulting from that task or function is incorporated into that entityā€™s financial statements . This relates to internal controls over financial reporting . ( Essentially the replacement for the old SAS 70). Examples of outsourced tasks that would fall under SSAE16 (payroll, benefit plans, payment processing) Because of the extensive misunderstanding of SAS 70, the AICPA has developed a framework of reports to help prevent misunderstanding of SSAE 16 and to explain the additional levels of assurance now available. In particular, with the growth of cloud computing , the increase in outsourcing , and the proliferation of data breaches , service organizations are seeking some kind of ā€œassuranceā€ over controls other than internal control over financial reporting so their customers know that they have met a level of reliability and trust . The new SOC framework makes that assurance possible. 09/12/2012
  8. There are 3 types of ā€œSOCā€ reports , which h as opened up reporting from traditional third-party service provides (e.g. ADP, Benefit Plans, etc.) to a larger number of companies (e.g. cloud providers, data centers, event planners) You would work with your CPA to determine which type of report is appropriate. As an added benefit to service organizations, for a year after the engagement on its controls , the service organization can use a specially designed logo in its marketing and on its website. Youā€™ll see that on the next slide. CPAs, service organizations and users can find out about what the reports mean, how they can be used and other information on a special webpage. 09/12/2012
  9. Here you see the two SOC logos. They are used for marketing purposes to promote the SOC brand.Ā  The logo on the top is for use by CPAs who provide the assurance engagements that result in a SOC 1, 2 or 3 report. The logo on the bottom is a marketing tool that service organizations can use in promotional material or display on their websites to show that they had one or more of the three SOC engagements performed within the year . Note that this is NOT a seal , which is only provided on SOC 3 engagements and is administered by the Canadian Institute of Chartered Accountants (CICA). Ā  09/12/2012
  10. Here is a good summary of the three SOC reports. Notice SOC 2 & 3 based on Trust Service Principles and Criteria ā€“ more on that later Now Iā€™ll go into more detail on each. 09/12/2012
  11. The new SSAE 16 retains the original purpose of SAS 70 . This option has been rebranded as an SOC 1 report (some call it an SSAE16 report) ā€“ SOC 1 is easier to say. 09/12/2012
  12. One or more of these areas may be addressed in single report. Door open for other potential areas (e.g. compliance ā€“ HIPAA, Red Flag Rules, Dodd Frank Conflict Minerals, etc.). Report helps user organization management carry out its responsibility for monitoring the services it receives , including the operating effectiveness of a service organizationā€™s controls over those services. Security. The system is protected against unauthorized access (both physical and logical). Availability. The system is available for operation and use as committed or agreed (SLA). Processing integrity. System processing is complete, accurate, timely, and authorized. Confidentiality. Information designated as confidential is protected as committed or agreed. Privacy. Thoughts on how privacy might differ from confidentiality? Personal information is collected, used, retained, disclosed, and destroyed in conformity with the commitments in the entityā€™s privacy notice and with criteria set forth in generally accepted privacy principles (GAPP) issued by the AICPA and CICA (found in appendix D [paragraph .48]). Unlike personal information, which is defined by regulation in a number of countries worldwide and is subject to the privacy principles, there is no widely recognized definition of what constitutes confidential information. (Eg, IP, M&A) Guesses at most common criteria used? Security, Privacy. Canā€™t we just combine a SOC 1 and SOC 2 report by including SOC 2 criteria in a SOC 1 report? Because of the similarities between SOC 1 and SOC 2 reports, our clients may assume that SOC 2 reports, or portions thereof, provide assurance over their ICFR. However, as noted above, controls associated with SOC 2 reports are generally not relevant to a user entityā€™s ICFR and, as such, SOC 2 reports are not intended for use in financial statement or ICFR audits . If you receive a SOC 2 report from your vendor, you are encouraged to contact the vendor to request a SOC 1 report. IT is biggest area of confusion. Some overlap with IT controls in a SOC 1 and a SOC 2 (Esp. Security and Process Integrity) ā€“ SOC 1 focuses on controls over ICFR (IT General Controls - Access to Programs and Data, Program Changes, Program Development, and Computer Operations). 09/12/2012
  13. Similar to SOC 1 - Type 1 reports cover suitability of control design, while Type 2 reports also cover control operating effectiveness. Type 1 ā€“ point in time Type 2 ā€“ over reporting period 09/12/2012