SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
• Global, not-for-profit organization, started Nov. 2008,
  individual members (free), corporate members and
  affiliated organizations
• Inclusive membership, supporting broad spectrum of
  subject matter expertise: cloud experts, security, legal,
  compliance, virtualization, and on and on…
• We believe Cloud Computing has a robust future, we
  want to make it better
 “To promote the use of best practices for providing security assurance
   within Cloud Computing, and provide education on the uses of Cloud
          Computing to help secure all other forms of computing.”

                   Copyright © 2009 Cloud Security Alliance
   www.cloudsecurityalliance.org
•  April 2009: Security Guidance for Critical Areas of Focus for Cloud
  Computing – Version 1
•  July 2009: Version 1 translated into Japanese
•  November 2009: Security Guidance for Critical Areas of Focus for
  Cloud Computing – Version 2
•  Q4 2009: Top Ten Cloud Threats (monthly)
•  Q4 2009: Provider & Customer Checklists
•  Q4 2009: eHealth Guidance
•  Global CSA Executive Summits
  •  Q1 2010 – Europe
  •  Q1 or Q2 2010 - US
                     Copyright © 2009 Cloud Security Alliance
   www.cloudsecurityalliance.org
Copyright © 2009 Cloud Security Alliance
   www.cloudsecurityalliance.org
Focusing the Security Discussion
                                                                                                                IaaS, Hybrid,"
                                                          Application Domains
                                                                                                                    HPC/
  SaaS,                                                                                                           Analytics
  Public,"
   CRM




                                                                                                     Private
                              Software as a Service




                                                                                           Hybrid
                                                                                 Public
             XaaS Layers




                               Platform as a Service


                            Infrastructure as a Service
                                                                                                                IaaS, Public,"
                                                                                                                Transcoding
                             Copyright © 2009 Cloud Security Alliance
           www.cloudsecurityalliance.org
1.  Architecture & Framework
Governing in the Cloud
                              Operating in the Cloud
 1.  Governance & Risk Mgt
                               1.  Traditional, BCM, DR
 2.  Legal
                                               2.  Data Center Operations
 3.  Electronic Discovery
                                3.  Incident Response
 4.  Compliance & Audit
                                  4.  Application Security
 5.  Information Lifecycle Mgt
                           5.  Encryption & Key Mgt
 6.  Portability &                                        6.  Identity & Access Mgt
     Interoperability
                                    7.  Storage
                                                          8.  Virtualization
                  Copyright © 2009 Cloud Security Alliance
     www.cloudsecurityalliance.org
Analyzing Cloud Security
• Some key issues: 
     Trust, multi-tenancy, encryption, key
     management compliance
• Clouds are massively complex systems can be
  reduced to simple primitives that are replicated
  thousands of times and common functional units
• Cloud security is a tractable problem
     There are both advantages and challenges 

               Copyright © 2009 Cloud Security Alliance
   www.cloudsecurityalliance.org
Balancing Threat Exposure and Cost
Effectiveness


• Private clouds may have less threat exposure than
  community or hosted clouds which have less
  threat exposure than public clouds. 
• Massive public clouds may be more cost effective
  than large community clouds which may be more
  cost effective than small private clouds. 



              Copyright © 2009 Cloud Security Alliance
   www.cloudsecurityalliance.org
General Security Advantages
• Democratization of security capabilities
• Shifting public data to a external cloud
  reduces the exposure of the internal
  sensitive data
• Forcing functions to add security controls 
• Clouds enable automated security
  management
• Redundancy / Disaster Recovery
             Copyright © 2009 Cloud Security Alliance
   www.cloudsecurityalliance.org
General Security Challenges
• Trusting vendor’s security model
• Customer inability to respond to audit findings
• Obtaining support for investigations
• Indirect administrator accountability
• Proprietary implementations can’t be
  examined
• Loss of physical control
              Copyright © 2009 Cloud Security Alliance
   www.cloudsecurityalliance.org
•  Geo-location of sensitive data
•  Inability to deploy security services (e.g. scanning)
•  Risk with shared computing platform (multi-tenant)
•  Data confidentiality
•  Access via internet – untrusted
•  Cloud vendors for the most part non-committal on security
•  Company data on 3rd party machine
•  Compliance lacking – inability to satisfy auditors
•  Vendors not up to speed from a guidance and auditing perspective
•  Inability to perform forensic investigation
                      Copyright © 2009 Cloud Security Alliance
   www.cloudsecurityalliance.org
“We have to accept what we all know to be elemental - 
  that taking a defensive position can, at best, only limit
                           losses.
                     And we need gains."


Peter F. Drucker



                Copyright © 2009 Cloud Security Alliance
   www.cloudsecurityalliance.org
• Cloud Computing is real and transformational
• Cloud Computing can be secured but also can carry
  increased risk due to aggregation of assets
• Broad governance approach needed
• Tactical fixes needed
• Combination of updating existing best practices and
  creating completely new best practices
• Common sense not optional
                Copyright © 2009 Cloud Security Alliance
   www.cloudsecurityalliance.org
• Join us, help make our work better
• Discussions & announcements on LinkedIn
• Hold regional CSA Meetups
• Other research initiatives and events being planned



                Copyright © 2009 Cloud Security Alliance
   www.cloudsecurityalliance.org
• Individual Membership (free)
  • Subject matter experts for research
  • Interested in learning about the topic
  • Administrative & organizational help
• Corporate Sponsorship
  • Help fund outreach, events
• Affiliated Organizations (free)
  • Joint projects in the community interest
• Contact information on website
                   Copyright © 2009 Cloud Security Alliance
   www.cloudsecurityalliance.org
• www.cloudsecurityalliance.org
• info@cloudsecurityalliance.org
• Twitter: @cloudsa, #csaguide
• LinkedIn: www.linkedin.com/groups?gid=1864210 



                Copyright © 2009 Cloud Security Alliance
   www.cloudsecurityalliance.org
Cloud Security Alliance - Guidance

Mais conteúdo relacionado

Mais procurados

Understanding Cloud Computing & Its Relevance to Financial Software Solutions
Understanding Cloud Computing & Its Relevance to Financial Software SolutionsUnderstanding Cloud Computing & Its Relevance to Financial Software Solutions
Understanding Cloud Computing & Its Relevance to Financial Software Solutions
Zannettos Zannettou
 
Cloud computing 2
Cloud computing 2Cloud computing 2
Cloud computing 2
Shyam Kona
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud final
guest50a642f
 

Mais procurados (20)

Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
 
Cloud Computing - Challenges and Opportunities - Jens Nimis
Cloud Computing - Challenges and Opportunities  -  Jens NimisCloud Computing - Challenges and Opportunities  -  Jens Nimis
Cloud Computing - Challenges and Opportunities - Jens Nimis
 
MISA Cloud workshop - Cloud 101
MISA Cloud workshop - Cloud 101MISA Cloud workshop - Cloud 101
MISA Cloud workshop - Cloud 101
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")
 
Cloud Governance Framework - Required Cloud Sourcing Capabilities
Cloud Governance Framework - Required Cloud Sourcing CapabilitiesCloud Governance Framework - Required Cloud Sourcing Capabilities
Cloud Governance Framework - Required Cloud Sourcing Capabilities
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A Review
 
Chap 4 platform as a service (paa s)
Chap 4 platform as a service (paa s)Chap 4 platform as a service (paa s)
Chap 4 platform as a service (paa s)
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Understanding Cloud Computing & Its Relevance to Financial Software Solutions
Understanding Cloud Computing & Its Relevance to Financial Software SolutionsUnderstanding Cloud Computing & Its Relevance to Financial Software Solutions
Understanding Cloud Computing & Its Relevance to Financial Software Solutions
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Introduction to Cloud Computing and Security
Introduction to Cloud Computing and SecurityIntroduction to Cloud Computing and Security
Introduction to Cloud Computing and Security
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research Topics
 
Cloud computing 2
Cloud computing 2Cloud computing 2
Cloud computing 2
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...
 
Cloud computing Basics
Cloud computing BasicsCloud computing Basics
Cloud computing Basics
 
Opportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputingOpportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputing
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud final
 

Destaque

Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - Frantic
Miika Puputti
 
Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - Chandna
Asheem Chandna
 
How to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink YouHow to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink You
Skyhigh Networks
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
Sergio Loureiro
 

Destaque (17)

Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - Frantic
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines
 
16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs
 
Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - Chandna
 
How to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink YouHow to Find Security Breaches Before They Sink You
How to Find Security Breaches Before They Sink You
 
The Dark Side of the Web
The Dark Side of the WebThe Dark Side of the Web
The Dark Side of the Web
 
The 80-20 Rule for Data in the Cloud
The 80-20 Rule for Data in the CloudThe 80-20 Rule for Data in the Cloud
The 80-20 Rule for Data in the Cloud
 
The Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the Enterprise
The Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the EnterpriseThe Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the Enterprise
The Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the Enterprise
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 
State of the Cloud in 2015
State of the Cloud in 2015State of the Cloud in 2015
State of the Cloud in 2015
 
The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Ot...
The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Ot...The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Ot...
The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Ot...
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
2014: The Year of the Data Breach
2014: The Year of the Data Breach2014: The Year of the Data Breach
2014: The Year of the Data Breach
 
The Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaThe Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and Sequoia
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done Right
 
How to make a presentation like Steve Jobs
How to make a presentation like Steve JobsHow to make a presentation like Steve Jobs
How to make a presentation like Steve Jobs
 
Make Your Presentation Memorable
Make Your Presentation MemorableMake Your Presentation Memorable
Make Your Presentation Memorable
 

Semelhante a Cloud Security Alliance - Guidance

Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
ikanow
 
Cloud Computing Webinar
Cloud Computing WebinarCloud Computing Webinar
Cloud Computing Webinar
Saif Ahmad
 
Cloud Computing For Enterprises
Cloud Computing For EnterprisesCloud Computing For Enterprises
Cloud Computing For Enterprises
One App Cloud
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloud
nooralmousa
 
Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012
Agora Group
 

Semelhante a Cloud Security Alliance - Guidance (20)

Presd1 10
Presd1 10Presd1 10
Presd1 10
 
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityHow Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
 
Nils Puhlmann Ncoic Slides
Nils Puhlmann Ncoic SlidesNils Puhlmann Ncoic Slides
Nils Puhlmann Ncoic Slides
 
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
 
Cloud Computing Webinar
Cloud Computing WebinarCloud Computing Webinar
Cloud Computing Webinar
 
Cloud Computing For Enterprises
Cloud Computing For EnterprisesCloud Computing For Enterprises
Cloud Computing For Enterprises
 
Lets Do the Cloud-CFO Summit 2013
Lets Do the Cloud-CFO Summit 2013Lets Do the Cloud-CFO Summit 2013
Lets Do the Cloud-CFO Summit 2013
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
Demystifying The Cloud-iON Cloud ERP
Demystifying The Cloud-iON Cloud ERPDemystifying The Cloud-iON Cloud ERP
Demystifying The Cloud-iON Cloud ERP
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloud
 
Security in a Cloudy Architecture
Security in a Cloudy ArchitectureSecurity in a Cloudy Architecture
Security in a Cloudy Architecture
 
Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2
 
Cloud Computing Enables Consumer-Centered Healthcare
Cloud Computing Enables Consumer-Centered HealthcareCloud Computing Enables Consumer-Centered Healthcare
Cloud Computing Enables Consumer-Centered Healthcare
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACH
 
Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012
 
ON event - May 2010
ON event - May 2010ON event - May 2010
ON event - May 2010
 
Cloud computing overview
Cloud computing overviewCloud computing overview
Cloud computing overview
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Cloud Security Alliance - Guidance

  • 1.
  • 2. • Global, not-for-profit organization, started Nov. 2008, individual members (free), corporate members and affiliated organizations • Inclusive membership, supporting broad spectrum of subject matter expertise: cloud experts, security, legal, compliance, virtualization, and on and on… • We believe Cloud Computing has a robust future, we want to make it better “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.” Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 3. •  April 2009: Security Guidance for Critical Areas of Focus for Cloud Computing – Version 1 •  July 2009: Version 1 translated into Japanese •  November 2009: Security Guidance for Critical Areas of Focus for Cloud Computing – Version 2 •  Q4 2009: Top Ten Cloud Threats (monthly) •  Q4 2009: Provider & Customer Checklists •  Q4 2009: eHealth Guidance •  Global CSA Executive Summits •  Q1 2010 – Europe •  Q1 or Q2 2010 - US Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 4.
  • 5. Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 6. Focusing the Security Discussion IaaS, Hybrid," Application Domains HPC/ SaaS, Analytics Public," CRM Private Software as a Service Hybrid Public XaaS Layers Platform as a Service Infrastructure as a Service IaaS, Public," Transcoding Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 7. 1.  Architecture & Framework Governing in the Cloud Operating in the Cloud 1.  Governance & Risk Mgt 1.  Traditional, BCM, DR 2.  Legal 2.  Data Center Operations 3.  Electronic Discovery 3.  Incident Response 4.  Compliance & Audit 4.  Application Security 5.  Information Lifecycle Mgt 5.  Encryption & Key Mgt 6.  Portability & 6.  Identity & Access Mgt Interoperability 7.  Storage 8.  Virtualization Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 8. Analyzing Cloud Security • Some key issues:  Trust, multi-tenancy, encryption, key management compliance • Clouds are massively complex systems can be reduced to simple primitives that are replicated thousands of times and common functional units • Cloud security is a tractable problem  There are both advantages and challenges Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 9. Balancing Threat Exposure and Cost Effectiveness • Private clouds may have less threat exposure than community or hosted clouds which have less threat exposure than public clouds. • Massive public clouds may be more cost effective than large community clouds which may be more cost effective than small private clouds. Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 10. General Security Advantages • Democratization of security capabilities • Shifting public data to a external cloud reduces the exposure of the internal sensitive data • Forcing functions to add security controls • Clouds enable automated security management • Redundancy / Disaster Recovery Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 11. General Security Challenges • Trusting vendor’s security model • Customer inability to respond to audit findings • Obtaining support for investigations • Indirect administrator accountability • Proprietary implementations can’t be examined • Loss of physical control Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 12. •  Geo-location of sensitive data •  Inability to deploy security services (e.g. scanning) •  Risk with shared computing platform (multi-tenant) •  Data confidentiality •  Access via internet – untrusted •  Cloud vendors for the most part non-committal on security •  Company data on 3rd party machine •  Compliance lacking – inability to satisfy auditors •  Vendors not up to speed from a guidance and auditing perspective •  Inability to perform forensic investigation Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 13. “We have to accept what we all know to be elemental - that taking a defensive position can, at best, only limit losses. And we need gains." Peter F. Drucker Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 14. • Cloud Computing is real and transformational • Cloud Computing can be secured but also can carry increased risk due to aggregation of assets • Broad governance approach needed • Tactical fixes needed • Combination of updating existing best practices and creating completely new best practices • Common sense not optional Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 15. • Join us, help make our work better • Discussions & announcements on LinkedIn • Hold regional CSA Meetups • Other research initiatives and events being planned Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 16. • Individual Membership (free) • Subject matter experts for research • Interested in learning about the topic • Administrative & organizational help • Corporate Sponsorship • Help fund outreach, events • Affiliated Organizations (free) • Joint projects in the community interest • Contact information on website Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org
  • 17. • www.cloudsecurityalliance.org • info@cloudsecurityalliance.org • Twitter: @cloudsa, #csaguide • LinkedIn: www.linkedin.com/groups?gid=1864210 Copyright © 2009 Cloud Security Alliance www.cloudsecurityalliance.org