SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
Sumaya Shakir
                                                              Sumaya.shakir@gmail.com
                                                                       September 2012

Cloud Computing Security Risks
Background and key information:
It finally seems like the Feds are catching up with the Cloud era boom. The US
government has released its stand on the data security on cloud technologies at the
Security in Government 2012 conference. Important concerns regarding the
jurisdictional issues of data storage were raised. The Federal Financial Institutions
Examination Council(FFIEC) issued a press release with cloud computing risks and
issued guidelines in its FFIEC IT Examination Handbook. The department will be
coming up with new cloud guidelines. Separately in Europe, the European Network
and Information Security Agency (ENISA) and the Cloud Security Alliance (CSA)
have come up with their own assessment of how to addresses cloud risk
guidelines. The European commission and European data protection council has issued
statements indicating firms offering cloud solutions should offer legal clarity and clear
privacy policies. The UK Government Digital Service is formulating its policies to
maximize on the potential benefits to the UK economy. The CSA is also working on
standards for cloud interface.

HP has partnered with VMware in providing cloud platform solutions. The partnership
aims at providing infrastructure with strong security and converged cloud solutions to
the PCI industry. The companies are selling their solutions that goes beyond addressing
the security guidelines put forth by various councils; it will be interesting to see how HP-
VMware partnership will fair against various commission guidelines. In another initiative
HP has partnered with Microsoft for cloud integration. HP has signed new contracts with
various government organizations to provide both hardware and software solutions. HP
has made new investments in cloud computing in China. Following its China five-year
growth plan, HP opened a brand new center called HP Cloud Executive Briefing Center
in Tianjin and expanded its R & D in China. In addition, HP has started other big
investments in China. With so many countries and their respective Governments on the
bandwagon trying to form their own policies and drawing the blueprint of how the cloud
infrastructure should look like, the result will be a set of conflicting laws and regulations
between borders and countries. To add to the complexity, some governments are leery
of working with China. And China’s stand on how these services will impact its own
industry and Government is a question that is yet to be raised.

While HP is ahead of the game, it may be missing some key mandates from the Cloud
Security Alliance and the various Government policies that could prove as a costly
mistake. Moreover setting up a cloud hub in China could be security threat to
businesses and organization in the US including the US government especially in the
wake of latest allegations in regards to spying from two big Chinese firms ZTE Corp.
and Huawei Technologies. Given the sensitive nature of government and payment data,
this can soon become an unmanageable nightmare and lead to unimaginable
vulnerabilities for the United States or for the western European nations. The issue is in

                                                                                            1
the late formation phase and early interest group formation. The issues are skirting
around the cloud circles and in the various CSA congress presentations and has yet to
be identified as a full blown threat. The story has been picked up by a few freelance
technology        journalists.       For         example,        the       author        for
http://www.businesscloud9.com/content/policy-blueprint-cloud-computing-market/11476
has provided enough validation to show the issues surrounding a global cloud dilemma.
The main interest groups for this issue will be the consumers and enterprises across the
globe that will use the cloud services technology irrespective of geographical
boundaries. There is no doubt that the Governments across the globe have to take an
active role in formulating the compliance and security protocols and HP being a key
leader of cloud services will be impacted by this and needs to be more involved with the
formation of any cloud law legislation that will give it a competitive advantage in the non
market arena.


Cloud Computing Security Risks

Issue Summary:

 Issue               Security vulnerabilities in Cloud Computing
 Interest            Cloud Security Alliance
 Groups              Consumer and Enterprise Business using Cloud
                      Services
                     Banks, Payments Card Industry(PCI)
                     Government Organizations like US Military
 Institutions        UK Government Digital Service,
                     Federal Financial Institutions Examination
                      Council ( FFIEC),
                     European Network and Information Security
                      Agency (ENISA)
 Information         Jurisdictional issues of data storage
                     Cloud     Computing       conflicting   laws    and
                      regulations between borders and countries
                      needs to be resolved
                     Safety of hosting cloud services from China
 Issue     Life      Late issue identification, early interest group
 Cycle                formation
 Media               Currently the story is published by a few
 Attention            technology magazines. Main stream media is yet
                      to pick up the story but eventually in the next few
                      months, this issue will be a hot topic.

HP’s Business Strategic Political Actions for Security Risks

Lobbying


                                                                                          2
HP, Microsoft and other internet companies who are offering services on the Cloud
have been lobbying for safer cloud computing laws since 2010. Microsoft general
counsel Brad Smith insisted on electronic privacy laws being updated during a Senate
Judiciary Committee in Washington in 2010. Since then, there have been continued
lobbying efforts for cloud security.

HP as part of the Cloud Security Alliance group has been lobbying against the
Cybersecurity Act of 2012 and has been successful in protecting the cloud initiatives.




The above graph shows HP’s spending on lobbying for various causes including trade
legislations, cloud security, data security and privacy regulations, patent approvals, free
trade, broadband subsidies and defense funding. HP is one of the biggest spenders on
lobbying efforts. It hires lobbying firms like Palmetto Group, Mehlman Vogel Castagnetti
Inc, Sternhell Group, Innovative Federal Strategies and Akin, Gump et al . HP has
spent $3,750,000 so far in 2012 on various lobbying.

There are a number of individual cloud computing legislations that HP along with
Microsoft, Google, Facebook and other companies have been lobbying like the policy
issues in cloud computing, Electronic Communications Privacy Act (ECPA) and the
number of other policies regarding,

   Cloud Physical Location and Access Issues Jurisdictional issues affecting the
    Cloud. Example: “safe harbor law - a European law enacted in reaction to the U.S.
    Patriot Act. Another example is the Trade Agreements Act of 1979 (TAA) prohibits
    government contractors from using cloud serveices that are set up in countries that
    don’t have trade agreements with United States.
   Privacy, Security and the Cloud Concerns around data stored in the Cloud is less
    protected than other in other contexts. fundamental concern about the security of
    essential business and government information and processes maintained in the
    Cloud.
   Law Enforcement and the Cloud Concerns with privacy issues in law enforcement
    context and legal protections against unreasonable search and seizure of data
    stored in a Cloud context. Example: Congress is currently reviewing a proposed
    update to the Electronic Communications Privacy Act

                                                                                          3
   Intellectual Property (IP) and the Cloud Concerns regarding valuable intellectual
    property, trade secrets or copyrighted material in a Cloud environment. Example:
    The Digital Millennium Copyright Act provides a safe harbor to cloud service
    providers from infringement liability for copyright violations if they adhere to
    guidelines and immediately block access or remove copyrighted materials from their
    website upon notification.
   Global Competition and the Cloud: U.S. companies can compete for a share of
    global cloud market but U.S. put them at a competitive disadvantage. Example: U.S.
    Patriot Act

Sen. Amy Klobuchar has introduced a new bill called the “Cloud Computing Act of
2012” (S.3569), that is supposed to “ improve the enforcement of criminal and civil law
with respect to cloud computing.”
The proposed bill’s main purpose is to give “cloud computing services” protections
under the CFAA. HP as part of the CSA alliance is lobbying for this bill.

Eric Goldman, Internet Law professor from Santa Clara University has written an article
on forbes.com regarding the Cloud Computing Act . The article can be found at
http://www.forbes.com/sites/ericgoldman/2012/10/02/the-proposed-cloud-computing-
act-of-2012-and-how-internet-regulation-can-go-awry/


Forming Coalitions
HP is part of the Cloud Security Alliance group to promote the use of best practices
for providing security assurance within Cloud Computing. All the top companies like
Google, MicroSoft and even US Department of Defense are members of this alliance
group. The Alliance aims to provide education on the uses of Cloud Computing. The
Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations,
associations and other key stakeholders.




                                                                                           4
HP along with the CSA has developed a number of useful and valuable resources like
the secure best practices for cloud computing, tools for managing governance, risk and
compliance, cloud user certification and cloud security knowledge certification, registry
of cloud services amongst other cloud security standards.

Public Advocacy & Awareness Raising
For the last 8 years, every year HP has used events like HP Protect to raise awareness
and increase visibility on security infrastructure, potential security risks and breaches,
security landscape, cloud security information, security and compliance standards by
hosting a two day event where it invites experts, architects, and gurus under one roof. It
then makes public all the lectures, information shared during the summit to the general
population.

HP along with CSA has provided a number of toolkits, handbooks, standards, guides to
educate various businesses and public interested in cloud security. HP provides this
information on its website and also on CSA website.

HP also attends other security conferences like the RSA and shares its
knowledge/research with the community. It has also set up community forums,
knowledge base, FAQs, social media and blogs to reach out the general public on its
efforts on Cloud Computing Security.


Summary
          HP’s Political Strategy for addressing Cloud Security Issues
Lobbying              Cloud Physical Location and Access Issues
                      Privacy, Security and the Cloud
                      Law Enforcement and the Cloud Electronic
                        Communications Privacy Act
                      Intellectual Property (IP) and the Cloud The Digital
                        Millennium Copyright Act
                      Global Competition and the Cloud: U.S. Patriot Act
                      Cloud Computing Act of 2012
Coalition             Cloud Security Alliance


Public Advocacy         Protect 2012
&        Raising        RSA
Awareness               HP website – community groups, forums, blogs, social
                         media

Conclusion
HP is taking cloud computing seriously and is using every avenue to be as close as
possible to meeting the mandates of the Cloud Security Alliance and the various
Government policies in order to avoid any costly mistakes. It is staying close by
lobbying to the various legislations related to cloud computing.

                                                                                            5

Mais conteúdo relacionado

Mais procurados

delphix-wp-gdpr-for-data-masking
delphix-wp-gdpr-for-data-maskingdelphix-wp-gdpr-for-data-masking
delphix-wp-gdpr-for-data-maskingJes Breslaw
 
Practical Guide to GDPR 2017
Practical Guide to GDPR 2017Practical Guide to GDPR 2017
Practical Guide to GDPR 2017Dryden Geary
 
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...John Nas
 
8 Tech Predictions for 2018
8 Tech Predictions for 20188 Tech Predictions for 2018
8 Tech Predictions for 2018Chelsea Dickson
 
8 Tech Predictions for 2018
8 Tech Predictions for 20188 Tech Predictions for 2018
8 Tech Predictions for 2018Aftab Jamil
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?Hayden McCall
 
GDPR, what you need to know and how to prepare for it e book
GDPR, what you need to know and how to prepare for it e bookGDPR, what you need to know and how to prepare for it e book
GDPR, what you need to know and how to prepare for it e bookPlr-Printables
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
Digital Transformation Summit: theJurists Europe case
Digital Transformation Summit: theJurists Europe caseDigital Transformation Summit: theJurists Europe case
Digital Transformation Summit: theJurists Europe caseMatthias Dobbelaere-Welvaert
 
Relationship between data protection and m&a (1)
Relationship between data protection and m&a (1)Relationship between data protection and m&a (1)
Relationship between data protection and m&a (1)Ashish vishal
 
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz..."Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...Cédric Laurant
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Michael C. Keeling, Esq.
 
Cyber risk challenge and the role of insurance
Cyber risk challenge and the role of insuranceCyber risk challenge and the role of insurance
Cyber risk challenge and the role of insuranceMunich Re
 
Trends in legal tech 2018
Trends in legal tech 2018Trends in legal tech 2018
Trends in legal tech 2018Dan Storbaek
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloudblogzilla
 
Marketing data management | The new way to think about your data
Marketing data management | The new way to think about your dataMarketing data management | The new way to think about your data
Marketing data management | The new way to think about your dataLaurence
 
Draft data protection regn 2012
Draft data protection regn 2012Draft data protection regn 2012
Draft data protection regn 2012lilianedwards
 
art - MM Transformer - CIO Council (09-16) v1
art - MM Transformer - CIO Council (09-16) v1art - MM Transformer - CIO Council (09-16) v1
art - MM Transformer - CIO Council (09-16) v1Marlon Moodley
 
INFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL securityINFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL securitySamo Zavašnik
 

Mais procurados (19)

delphix-wp-gdpr-for-data-masking
delphix-wp-gdpr-for-data-maskingdelphix-wp-gdpr-for-data-masking
delphix-wp-gdpr-for-data-masking
 
Practical Guide to GDPR 2017
Practical Guide to GDPR 2017Practical Guide to GDPR 2017
Practical Guide to GDPR 2017
 
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
Cloud4eu - WhitePaper - OnChallengeofAcceptanceofCloudSolutionsinEUPublicSect...
 
8 Tech Predictions for 2018
8 Tech Predictions for 20188 Tech Predictions for 2018
8 Tech Predictions for 2018
 
8 Tech Predictions for 2018
8 Tech Predictions for 20188 Tech Predictions for 2018
8 Tech Predictions for 2018
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?
 
GDPR, what you need to know and how to prepare for it e book
GDPR, what you need to know and how to prepare for it e bookGDPR, what you need to know and how to prepare for it e book
GDPR, what you need to know and how to prepare for it e book
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Digital Transformation Summit: theJurists Europe case
Digital Transformation Summit: theJurists Europe caseDigital Transformation Summit: theJurists Europe case
Digital Transformation Summit: theJurists Europe case
 
Relationship between data protection and m&a (1)
Relationship between data protection and m&a (1)Relationship between data protection and m&a (1)
Relationship between data protection and m&a (1)
 
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz..."Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
Cyber risk challenge and the role of insurance
Cyber risk challenge and the role of insuranceCyber risk challenge and the role of insurance
Cyber risk challenge and the role of insurance
 
Trends in legal tech 2018
Trends in legal tech 2018Trends in legal tech 2018
Trends in legal tech 2018
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloud
 
Marketing data management | The new way to think about your data
Marketing data management | The new way to think about your dataMarketing data management | The new way to think about your data
Marketing data management | The new way to think about your data
 
Draft data protection regn 2012
Draft data protection regn 2012Draft data protection regn 2012
Draft data protection regn 2012
 
art - MM Transformer - CIO Council (09-16) v1
art - MM Transformer - CIO Council (09-16) v1art - MM Transformer - CIO Council (09-16) v1
art - MM Transformer - CIO Council (09-16) v1
 
INFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL securityINFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL security
 

Semelhante a The non market issue of cloud computing hp - cloud security alliance

WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONJohn Pinson
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxbriancrawford30935
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technologyEzraGray1
 
Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityCloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityJohn Rhoton
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docxmayank272369
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is CloudWilliam Lam
 
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell GoodmanCloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodmanjonneiditz
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesCompTIA
 
My Little Blurb From Cloud Connect 2010
My Little Blurb From Cloud Connect 2010My Little Blurb From Cloud Connect 2010
My Little Blurb From Cloud Connect 2010Bharath Ram Srinivasan
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? Abraham Vergis
 

Semelhante a The non market issue of cloud computing hp - cloud security alliance (20)

WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
 
Is There Sun Behind Those Clouds
Is There Sun Behind Those CloudsIs There Sun Behind Those Clouds
Is There Sun Behind Those Clouds
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docx
 
NIST article I wrote
NIST article I wroteNIST article I wrote
NIST article I wrote
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityCloud Computing: New Approaches for Security
Cloud Computing: New Approaches for Security
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
Apt 510 slideshare
Apt 510 slideshareApt 510 slideshare
Apt 510 slideshare
 
softwss
softwsssoftwss
softwss
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
 
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell GoodmanCloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodman
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
Privacy Year In Preview
Privacy Year In PreviewPrivacy Year In Preview
Privacy Year In Preview
 
Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway
 
My Little Blurb From Cloud Connect 2010
My Little Blurb From Cloud Connect 2010My Little Blurb From Cloud Connect 2010
My Little Blurb From Cloud Connect 2010
 
Challenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computingChallenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computing
 
Clouds Roll In
Clouds Roll InClouds Roll In
Clouds Roll In
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore?
 

Último

New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateCannaBusinessPlans
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubaijaehdlyzca
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxDitasDelaCruz
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...pujan9679
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAITim Wilson
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecZurliaSoop
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Falcon Invoice Discounting
 

Último (20)

New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 

The non market issue of cloud computing hp - cloud security alliance

  • 1. Sumaya Shakir Sumaya.shakir@gmail.com September 2012 Cloud Computing Security Risks Background and key information: It finally seems like the Feds are catching up with the Cloud era boom. The US government has released its stand on the data security on cloud technologies at the Security in Government 2012 conference. Important concerns regarding the jurisdictional issues of data storage were raised. The Federal Financial Institutions Examination Council(FFIEC) issued a press release with cloud computing risks and issued guidelines in its FFIEC IT Examination Handbook. The department will be coming up with new cloud guidelines. Separately in Europe, the European Network and Information Security Agency (ENISA) and the Cloud Security Alliance (CSA) have come up with their own assessment of how to addresses cloud risk guidelines. The European commission and European data protection council has issued statements indicating firms offering cloud solutions should offer legal clarity and clear privacy policies. The UK Government Digital Service is formulating its policies to maximize on the potential benefits to the UK economy. The CSA is also working on standards for cloud interface. HP has partnered with VMware in providing cloud platform solutions. The partnership aims at providing infrastructure with strong security and converged cloud solutions to the PCI industry. The companies are selling their solutions that goes beyond addressing the security guidelines put forth by various councils; it will be interesting to see how HP- VMware partnership will fair against various commission guidelines. In another initiative HP has partnered with Microsoft for cloud integration. HP has signed new contracts with various government organizations to provide both hardware and software solutions. HP has made new investments in cloud computing in China. Following its China five-year growth plan, HP opened a brand new center called HP Cloud Executive Briefing Center in Tianjin and expanded its R & D in China. In addition, HP has started other big investments in China. With so many countries and their respective Governments on the bandwagon trying to form their own policies and drawing the blueprint of how the cloud infrastructure should look like, the result will be a set of conflicting laws and regulations between borders and countries. To add to the complexity, some governments are leery of working with China. And China’s stand on how these services will impact its own industry and Government is a question that is yet to be raised. While HP is ahead of the game, it may be missing some key mandates from the Cloud Security Alliance and the various Government policies that could prove as a costly mistake. Moreover setting up a cloud hub in China could be security threat to businesses and organization in the US including the US government especially in the wake of latest allegations in regards to spying from two big Chinese firms ZTE Corp. and Huawei Technologies. Given the sensitive nature of government and payment data, this can soon become an unmanageable nightmare and lead to unimaginable vulnerabilities for the United States or for the western European nations. The issue is in 1
  • 2. the late formation phase and early interest group formation. The issues are skirting around the cloud circles and in the various CSA congress presentations and has yet to be identified as a full blown threat. The story has been picked up by a few freelance technology journalists. For example, the author for http://www.businesscloud9.com/content/policy-blueprint-cloud-computing-market/11476 has provided enough validation to show the issues surrounding a global cloud dilemma. The main interest groups for this issue will be the consumers and enterprises across the globe that will use the cloud services technology irrespective of geographical boundaries. There is no doubt that the Governments across the globe have to take an active role in formulating the compliance and security protocols and HP being a key leader of cloud services will be impacted by this and needs to be more involved with the formation of any cloud law legislation that will give it a competitive advantage in the non market arena. Cloud Computing Security Risks Issue Summary: Issue  Security vulnerabilities in Cloud Computing Interest  Cloud Security Alliance Groups  Consumer and Enterprise Business using Cloud Services  Banks, Payments Card Industry(PCI)  Government Organizations like US Military Institutions  UK Government Digital Service,  Federal Financial Institutions Examination Council ( FFIEC),  European Network and Information Security Agency (ENISA) Information  Jurisdictional issues of data storage  Cloud Computing conflicting laws and regulations between borders and countries needs to be resolved  Safety of hosting cloud services from China Issue Life  Late issue identification, early interest group Cycle formation Media  Currently the story is published by a few Attention technology magazines. Main stream media is yet to pick up the story but eventually in the next few months, this issue will be a hot topic. HP’s Business Strategic Political Actions for Security Risks Lobbying 2
  • 3. HP, Microsoft and other internet companies who are offering services on the Cloud have been lobbying for safer cloud computing laws since 2010. Microsoft general counsel Brad Smith insisted on electronic privacy laws being updated during a Senate Judiciary Committee in Washington in 2010. Since then, there have been continued lobbying efforts for cloud security. HP as part of the Cloud Security Alliance group has been lobbying against the Cybersecurity Act of 2012 and has been successful in protecting the cloud initiatives. The above graph shows HP’s spending on lobbying for various causes including trade legislations, cloud security, data security and privacy regulations, patent approvals, free trade, broadband subsidies and defense funding. HP is one of the biggest spenders on lobbying efforts. It hires lobbying firms like Palmetto Group, Mehlman Vogel Castagnetti Inc, Sternhell Group, Innovative Federal Strategies and Akin, Gump et al . HP has spent $3,750,000 so far in 2012 on various lobbying. There are a number of individual cloud computing legislations that HP along with Microsoft, Google, Facebook and other companies have been lobbying like the policy issues in cloud computing, Electronic Communications Privacy Act (ECPA) and the number of other policies regarding,  Cloud Physical Location and Access Issues Jurisdictional issues affecting the Cloud. Example: “safe harbor law - a European law enacted in reaction to the U.S. Patriot Act. Another example is the Trade Agreements Act of 1979 (TAA) prohibits government contractors from using cloud serveices that are set up in countries that don’t have trade agreements with United States.  Privacy, Security and the Cloud Concerns around data stored in the Cloud is less protected than other in other contexts. fundamental concern about the security of essential business and government information and processes maintained in the Cloud.  Law Enforcement and the Cloud Concerns with privacy issues in law enforcement context and legal protections against unreasonable search and seizure of data stored in a Cloud context. Example: Congress is currently reviewing a proposed update to the Electronic Communications Privacy Act 3
  • 4. Intellectual Property (IP) and the Cloud Concerns regarding valuable intellectual property, trade secrets or copyrighted material in a Cloud environment. Example: The Digital Millennium Copyright Act provides a safe harbor to cloud service providers from infringement liability for copyright violations if they adhere to guidelines and immediately block access or remove copyrighted materials from their website upon notification.  Global Competition and the Cloud: U.S. companies can compete for a share of global cloud market but U.S. put them at a competitive disadvantage. Example: U.S. Patriot Act Sen. Amy Klobuchar has introduced a new bill called the “Cloud Computing Act of 2012” (S.3569), that is supposed to “ improve the enforcement of criminal and civil law with respect to cloud computing.” The proposed bill’s main purpose is to give “cloud computing services” protections under the CFAA. HP as part of the CSA alliance is lobbying for this bill. Eric Goldman, Internet Law professor from Santa Clara University has written an article on forbes.com regarding the Cloud Computing Act . The article can be found at http://www.forbes.com/sites/ericgoldman/2012/10/02/the-proposed-cloud-computing- act-of-2012-and-how-internet-regulation-can-go-awry/ Forming Coalitions HP is part of the Cloud Security Alliance group to promote the use of best practices for providing security assurance within Cloud Computing. All the top companies like Google, MicroSoft and even US Department of Defense are members of this alliance group. The Alliance aims to provide education on the uses of Cloud Computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. 4
  • 5. HP along with the CSA has developed a number of useful and valuable resources like the secure best practices for cloud computing, tools for managing governance, risk and compliance, cloud user certification and cloud security knowledge certification, registry of cloud services amongst other cloud security standards. Public Advocacy & Awareness Raising For the last 8 years, every year HP has used events like HP Protect to raise awareness and increase visibility on security infrastructure, potential security risks and breaches, security landscape, cloud security information, security and compliance standards by hosting a two day event where it invites experts, architects, and gurus under one roof. It then makes public all the lectures, information shared during the summit to the general population. HP along with CSA has provided a number of toolkits, handbooks, standards, guides to educate various businesses and public interested in cloud security. HP provides this information on its website and also on CSA website. HP also attends other security conferences like the RSA and shares its knowledge/research with the community. It has also set up community forums, knowledge base, FAQs, social media and blogs to reach out the general public on its efforts on Cloud Computing Security. Summary HP’s Political Strategy for addressing Cloud Security Issues Lobbying  Cloud Physical Location and Access Issues  Privacy, Security and the Cloud  Law Enforcement and the Cloud Electronic Communications Privacy Act  Intellectual Property (IP) and the Cloud The Digital Millennium Copyright Act  Global Competition and the Cloud: U.S. Patriot Act  Cloud Computing Act of 2012 Coalition  Cloud Security Alliance Public Advocacy  Protect 2012 & Raising  RSA Awareness  HP website – community groups, forums, blogs, social media Conclusion HP is taking cloud computing seriously and is using every avenue to be as close as possible to meeting the mandates of the Cloud Security Alliance and the various Government policies in order to avoid any costly mistakes. It is staying close by lobbying to the various legislations related to cloud computing. 5