SlideShare une entreprise Scribd logo
1  sur  37
Télécharger pour lire hors ligne
The cloud is in the details –
policy and requirements in
the era of cloud computing

    Ben Rothke, CISSP CISA
       BT Global Services
    Senior Security Consultant
About me
• Ben Rothke (too many certifications)
• Senior Security Consultant – British
  Telecom
• Frequent writer and speaker
• Author - Computer Security: 20 Things
  Every Employee Should Know
Agenda/Key take-away thought
• Agenda
  – Overview of the need to create specific
    requirements & policies for a cloud initiative


• Take-away
  – Contractors would never start building without
    plans and designs; a cloud project similarly
    shouldn’t be started without appropriate plans
    and designs and requirements definition
The cloud is here to stay
Don’t let your cloud project drive you bananas
Cloud computing-choose your definition

• Definition #1
  – Process you don’t full understand, manage poorly and is out
    of control, that you give to a cloud provider, with the hope
    and prayer that they can make sense of it and miraculously
    make it work; and be HIPAA, SoX and PCI compliant
• Definition #2
  – Corporate strategic decision to use service-oriented
    architecture and utility computing to on-demand network
    access to a shared pool of configurable computing
    resources; that support the firm’s tactical IT plans and long-
    term goals
Cloud challenges
•   Making cloud meet business requirements
•   integrating cloud into applications
•   producing documentation to deliver trust
•   management and reliability
•   planning and deployment
•   managing migration and scalability
Cloud security challenges
•   Authentication, identity management
•   compliance and regulatory
•   access control
•   trust management
•   policy
•   logging and accounting
•   privacy and data protection
CSA Top Threats
1. Abuse and Nefarious Use of Cloud
   Computing
2. Insecure Interfaces and APIs
3. Malicious Insiders
4. Shared Technology Issues
5. Data Loss or Leakage
6. Account or Service Hijacking
7. Unknown Risk Profile
The $64,000 cloud question
 What is your security problem and how
do you expect cloud services to solve it?

• Biggest mistake with cloud computing is
  that firms run to it without knowing why
• Then they use it with no plan for
  deployment
Other ill-defined projects
• Information Week, Computer World, etc.,
  continuously have stories about large
  projects ($25 - $200 million) that fail

• Why do these large Oracle, ERP, cloud,
  SAP projects continuously fail?
  – often inadequate, changing or conflicting
    requirements
Cloud success metrics
Cloud success is measured with the
following business questions:
  – does it deliver real business benefits?
  – was it deployed quickly and cost-effectively?
  – is it secure and does it provide trust?
  – is it reliable and easy to use?
  – can it be managed?
  – can it evolve and scale?
What is your deployment plan?
• Typical cloud project is likely to be more complex than
  previous experience of typical IT projects may suggest
• As well as project management, technical and
  operational aspects, there are many policy, legal and
  security issues which must not be neglected
• By understanding and defining appropriate
  requirements, many of the potential traps and pitfalls
  can be avoided
• The risks to the business and the project are reduced
  and those that remain are quantified at an early stage
Successful cloud deployment steps
1. Requirements Analysis
     –   Identify business, operational, commercial and security requirements
2. Architecture Definition
     –   Detailed definition of the operating model and cloud architecture
3. Operations
     –   Production of operational policies and procedures
4. Security Review
     –   Security review of the proposed system design, architecture and operations
5. Integration
     –   System piloting, integration of cloud enabled applications and testing
6. Deployment
     –   Operational deployment and production roll-out
7. Post-Deployment
     –   Management of upgrades and change processes for the production cloud
Step 1 - Requirements Analysis
• First step in implementing any cloud based
  solution is to understand the requirements:
  – what’s the problem and how do you expect a
    cloud to solve it?
  – what are the business drivers?
  – what level of security is appropriate?
  – where are the system vulnerabilities?
  – what are the legal and regulatory compliance
    constraints?
Step 1 - Requirements Analysis
• These requirements must be clearly
  identified and analyzed
• Analysis of the costs and business
  benefits and the provision of suitable
  project planning schemes are integral to
  step 1
  – If the requirements aren’t clear, do not go
    forward
Step 1 - Requirements Analysis – Project Planning

 • Project manager is essential
   – Some large-scale projects may need multiple
     managers
 • PM must be given the resources,
   responsibility and authority to successfully
   deliver the cloud project
 • Attempts to implement a cloud without PM
   have invariably resulted in failed projects
Step 2 - Architecture Definitions
• Once the requirements are known, the
  next step is to produce an operating model
  and to design the chosen cloud
  architecture
• At this stage, cloud enabling of end user
  applications is also considered, allowing
  parallel development
Step 2 - Architecture Definitions
Create set of documentation templates and
checklists to:
  – define how the cloud will be operated
  – define how trust will be passed between entities
  – define the cloud architecture, taking account of practical issues
    such as resilience, management, performance, security,
    scalability and current industry standards and best practices
  – specify what the architecture will comprise
  – specify how end-entity applications are to be cloud-enabled
  – specify how the complete cloud will be tested and supported
  – produce a detailed project plan
Step 2 – Cloud architecture
•   Public
•   private
•   hybrid
•   community

• What is the best architecture for you?
• The one that meets your specific
  requirements and needs
Step 3       Operations
• Identify the policies, procedures, support
  issues and SLA
• Organizational issues delineate who is
  responsible for the various parts of the cloud
• Any security system is only as effective to
  the degree it is correctly operated
  – define the operating procedures and controls
    necessary to make sure that that the cloud
    security system remains effective
Step 4 – Security Review
• With any system it is important to
  understand where the risks are and where
  the system is most vulnerable
  – Nothing will ever be 100% secure
• At this stage, the cloud is well specified and
  therefore it is important that the proposed
  system is subjected to an independent
  review and risk analysis and, where
  appropriate, corrective action is taken
Step 4 – Security Review
• The cloud is inherently unsafe and
  untrusted
• your job is to add the controls necessary
  to be a safe and trusted environment
Step 4 – Security Review
• Detailed lists of the threats, vulnerabilities
  and countermeasures
  – If you have an insecure infrastructure, then
    you will have an insecure cloud
• Creation of the system security policy
  provides a baseline level of security
  controls that must be implemented during
  cloud deployment
Step 4 - Risk analysis & assessment
• Effective risk assessment and analysis
  ensures you are worrying about the right
  things
• Ultimate outcome of a risk analysis should
  be to see if you really can benefit from the
  product
  – Don’t worry about missing the bus
Step 4 - Risk analysis & assessment
• Some companies have determined at Step
  4 that they really do not want to / can’t
  move forward
• Don’t be afraid to cancel a cloud project if
  there is not a business need for it, or if the
  security risks are too great
Step 4 – Cloud web applications
• Browsers are very complicated security
  environments
• understand how malware can thrive in a
  cloud environment
Step 4 - Policy
• Create and maintain policies on how you
  will address the many cloud security issues
  – identify threats to the cloud environment & its
    contents; ensure you address current threats
  – metrics for monitoring
  – accountability
  – incident response
  – adequate training for new/transitioned staff
Step 4 – Shared responsibilities
• Cloud provider
  – Responsible for security from the data center
    to the hypervisor
• Client
  – Responsible for security for the operating
    system and all applications

• But Saas, PaaS & IaaS will have different
  shared responsibility models
Step 5        Integration
• Integration of all the cloud components
  and the building of a pilot system against
  which all the functional, performance and
  operational requirements can be tested
• Integration testing of any cloud-enabled
  applications is also performed
• DR/BCP
  – Enterprise cloud be available 24 x 7 x 365
Step 6       Deployment
• This step involves the installation and
  validation of the operational cloud,
  followed by acceptance testing
• A security review and penetration test is
  included to ensure that the actual
  implementation meets all the security
  requirements
• Documentation is finalized and published
• Acceptance testing
Step 6         Deployment
• Project closure meeting and report
  – Customer agrees that all planned project
    activities have been completed, project
    performance information has been captured
    and the cloud project is properly closed
  – Projects have a defined duration, but without
    a formal project closure activity, a project can
    drift and never be satisfactorily concluded
Step 7      Post-deployment
• All systems are subject to change and
  cloud is no exception
  – Well-designed cloud should be able to
    integrate new requirements without having
    to be re-engineered
References
• Cloud Computing Risk Assessment
  – www.enisa.europa.eu/act/rm/files/deliverables/loud-computing-risk-assessment

• Security Guidance for Critical Areas of Focus
  – www.cloudsecurityalliance.org/csaguide.pdf

• Cloud Security Guidance
  – www.redbooks.ibm.com/redpapers/pdfs/redp4614.pdf

• Top Threats to Cloud Computing
  – www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf

• Cloud Security and Compliance: A Primer
  – www.sans.org/reading_room/analysts_program/mcafee_carbird_08_2010.pdf
Conclusion
• Cloud computing is a powerful platform
• But don’t attempt to roll-out an enterprise-
  wide cloud without a well-defined plan and
  adequate security requirements
Contact information
•   Ben Rothke, CISSP CISA
•   Senior Security Consultant
•   BT Professional Services
•   ben.rothke@bt.com

• www.linkedin.com/in/benrothke
• www.twitter.com/benrothke
• www.slideshare.net/benrothke
Click on the questions tab on your screen, type in your question, name
                   and e-mail address; then hit submit.

Contenu connexe

Tendances

How To Build An Incident Response Function
How To Build An Incident Response FunctionHow To Build An Incident Response Function
How To Build An Incident Response FunctionResilient Systems
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRTAPNIC
 
By Popular Demand: Co3's Latest and Greatest Features
By Popular Demand: Co3's Latest and Greatest Features By Popular Demand: Co3's Latest and Greatest Features
By Popular Demand: Co3's Latest and Greatest Features Resilient Systems
 
Co3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions WebinarCo3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions WebinarResilient Systems
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksResilient Systems
 
Practical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityPractical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityEnclaveSecurity
 
Network security, seriously?
Network security, seriously?Network security, seriously?
Network security, seriously?Peter Wood
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsInfonaligy
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response PlanResilient Systems
 
Webinar: Critical Steps For NIST Compliance
Webinar: Critical Steps For NIST ComplianceWebinar: Critical Steps For NIST Compliance
Webinar: Critical Steps For NIST ComplianceWithum
 
Cyber Rangers S1 E2
Cyber Rangers S1 E2Cyber Rangers S1 E2
Cyber Rangers S1 E2JudyEvans8
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1Lisa Niles
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryptionBen Rothke
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Claus Cramon Houmann
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure OrganizationsHelpSystems
 
Webinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWebinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWithum
 

Tendances (20)

How To Build An Incident Response Function
How To Build An Incident Response FunctionHow To Build An Incident Response Function
How To Build An Incident Response Function
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
By Popular Demand: Co3's Latest and Greatest Features
By Popular Demand: Co3's Latest and Greatest Features By Popular Demand: Co3's Latest and Greatest Features
By Popular Demand: Co3's Latest and Greatest Features
 
Co3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions WebinarCo3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions Webinar
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber Attacks
 
Practical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityPractical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device security
 
Network security, seriously?
Network security, seriously?Network security, seriously?
Network security, seriously?
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
 
Webinar: Critical Steps For NIST Compliance
Webinar: Critical Steps For NIST ComplianceWebinar: Critical Steps For NIST Compliance
Webinar: Critical Steps For NIST Compliance
 
Incident response
Incident responseIncident response
Incident response
 
Cyber Rangers S1 E2
Cyber Rangers S1 E2Cyber Rangers S1 E2
Cyber Rangers S1 E2
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
 
Chapter 1 Security Framework
Chapter 1   Security FrameworkChapter 1   Security Framework
Chapter 1 Security Framework
 
Soc
SocSoc
Soc
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations
 
Webinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWebinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the Trenches
 

Similaire à The cloud is in the details – policy and requirements in the era of cloud computing

Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantageMoshe Ferber
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The CloudPECB
 
Cloud migration presentation
Cloud migration presentationCloud migration presentation
Cloud migration presentationyeshlenchetty
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Standards Customer Council
 
School of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud ComSchool of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud ComTaunyaCoffman887
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyCloud Standards Customer Council
 
Cloud Adoption Framework Phase one-moving to the cloud
Cloud Adoption Framework Phase one-moving to the cloudCloud Adoption Framework Phase one-moving to the cloud
Cloud Adoption Framework Phase one-moving to the cloudAnthony Clendenen
 
Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your BusinessSecurity a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Businessshira koper
 
Fostering innovation through agile Government ICT
Fostering innovation through agile Government ICTFostering innovation through agile Government ICT
Fostering innovation through agile Government ICTsyeats
 
Governance Strategies for Cloud Transformation | AWS Public Sector Summit 2016
Governance Strategies for Cloud Transformation | AWS Public Sector Summit 2016Governance Strategies for Cloud Transformation | AWS Public Sector Summit 2016
Governance Strategies for Cloud Transformation | AWS Public Sector Summit 2016Amazon Web Services
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Tudor Damian
 
Forecast 2014: ODCA Cloud Maturity Model V2.0
Forecast 2014: ODCA Cloud Maturity Model V2.0Forecast 2014: ODCA Cloud Maturity Model V2.0
Forecast 2014: ODCA Cloud Maturity Model V2.0Open Data Center Alliance
 
Csa summit who can protect us education for cloud security professionals
Csa summit   who can protect us education for cloud security professionalsCsa summit   who can protect us education for cloud security professionals
Csa summit who can protect us education for cloud security professionalsCSA Argentina
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product SecuritySoftServe
 

Similaire à The cloud is in the details – policy and requirements in the era of cloud computing (20)

Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
Cloud application security (CCSP Domain 4)
Cloud application security (CCSP Domain 4)Cloud application security (CCSP Domain 4)
Cloud application security (CCSP Domain 4)
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
 
Cloud migration presentation
Cloud migration presentationCloud migration presentation
Cloud migration presentation
 
Cloud migration
Cloud migrationCloud migration
Cloud migration
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
School of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud ComSchool of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud Com
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
 
Cloud Adoption Framework Phase one-moving to the cloud
Cloud Adoption Framework Phase one-moving to the cloudCloud Adoption Framework Phase one-moving to the cloud
Cloud Adoption Framework Phase one-moving to the cloud
 
4831586.ppt
4831586.ppt4831586.ppt
4831586.ppt
 
Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your BusinessSecurity a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Business
 
Fostering innovation through agile Government ICT
Fostering innovation through agile Government ICTFostering innovation through agile Government ICT
Fostering innovation through agile Government ICT
 
Governance Strategies for Cloud Transformation | AWS Public Sector Summit 2016
Governance Strategies for Cloud Transformation | AWS Public Sector Summit 2016Governance Strategies for Cloud Transformation | AWS Public Sector Summit 2016
Governance Strategies for Cloud Transformation | AWS Public Sector Summit 2016
 
3.pptx
3.pptx3.pptx
3.pptx
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
 
Forecast 2014: ODCA Cloud Maturity Model V2.0
Forecast 2014: ODCA Cloud Maturity Model V2.0Forecast 2014: ODCA Cloud Maturity Model V2.0
Forecast 2014: ODCA Cloud Maturity Model V2.0
 
Csa summit who can protect us education for cloud security professionals
Csa summit   who can protect us education for cloud security professionalsCsa summit   who can protect us education for cloud security professionals
Csa summit who can protect us education for cloud security professionals
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
 
ch11.ppt
ch11.pptch11.ppt
ch11.ppt
 

Plus de Ben Rothke

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...Ben Rothke
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizationsBen Rothke
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryptionBen Rothke
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systemsBen Rothke
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about themBen Rothke
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity comBen Rothke
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligattBen Rothke
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothkeBen Rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperBen Rothke
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010Ben Rothke
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceBen Rothke
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswiftBen Rothke
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security Ben Rothke
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...Ben Rothke
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professionalBen Rothke
 

Plus de Ben Rothke (20)

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
 

Dernier

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 

Dernier (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 

The cloud is in the details – policy and requirements in the era of cloud computing

  • 1. The cloud is in the details – policy and requirements in the era of cloud computing Ben Rothke, CISSP CISA BT Global Services Senior Security Consultant
  • 2. About me • Ben Rothke (too many certifications) • Senior Security Consultant – British Telecom • Frequent writer and speaker • Author - Computer Security: 20 Things Every Employee Should Know
  • 3. Agenda/Key take-away thought • Agenda – Overview of the need to create specific requirements & policies for a cloud initiative • Take-away – Contractors would never start building without plans and designs; a cloud project similarly shouldn’t be started without appropriate plans and designs and requirements definition
  • 4. The cloud is here to stay
  • 5. Don’t let your cloud project drive you bananas
  • 6. Cloud computing-choose your definition • Definition #1 – Process you don’t full understand, manage poorly and is out of control, that you give to a cloud provider, with the hope and prayer that they can make sense of it and miraculously make it work; and be HIPAA, SoX and PCI compliant • Definition #2 – Corporate strategic decision to use service-oriented architecture and utility computing to on-demand network access to a shared pool of configurable computing resources; that support the firm’s tactical IT plans and long- term goals
  • 7. Cloud challenges • Making cloud meet business requirements • integrating cloud into applications • producing documentation to deliver trust • management and reliability • planning and deployment • managing migration and scalability
  • 8. Cloud security challenges • Authentication, identity management • compliance and regulatory • access control • trust management • policy • logging and accounting • privacy and data protection
  • 9. CSA Top Threats 1. Abuse and Nefarious Use of Cloud Computing 2. Insecure Interfaces and APIs 3. Malicious Insiders 4. Shared Technology Issues 5. Data Loss or Leakage 6. Account or Service Hijacking 7. Unknown Risk Profile
  • 10. The $64,000 cloud question What is your security problem and how do you expect cloud services to solve it? • Biggest mistake with cloud computing is that firms run to it without knowing why • Then they use it with no plan for deployment
  • 11. Other ill-defined projects • Information Week, Computer World, etc., continuously have stories about large projects ($25 - $200 million) that fail • Why do these large Oracle, ERP, cloud, SAP projects continuously fail? – often inadequate, changing or conflicting requirements
  • 12. Cloud success metrics Cloud success is measured with the following business questions: – does it deliver real business benefits? – was it deployed quickly and cost-effectively? – is it secure and does it provide trust? – is it reliable and easy to use? – can it be managed? – can it evolve and scale?
  • 13. What is your deployment plan? • Typical cloud project is likely to be more complex than previous experience of typical IT projects may suggest • As well as project management, technical and operational aspects, there are many policy, legal and security issues which must not be neglected • By understanding and defining appropriate requirements, many of the potential traps and pitfalls can be avoided • The risks to the business and the project are reduced and those that remain are quantified at an early stage
  • 14. Successful cloud deployment steps 1. Requirements Analysis – Identify business, operational, commercial and security requirements 2. Architecture Definition – Detailed definition of the operating model and cloud architecture 3. Operations – Production of operational policies and procedures 4. Security Review – Security review of the proposed system design, architecture and operations 5. Integration – System piloting, integration of cloud enabled applications and testing 6. Deployment – Operational deployment and production roll-out 7. Post-Deployment – Management of upgrades and change processes for the production cloud
  • 15. Step 1 - Requirements Analysis • First step in implementing any cloud based solution is to understand the requirements: – what’s the problem and how do you expect a cloud to solve it? – what are the business drivers? – what level of security is appropriate? – where are the system vulnerabilities? – what are the legal and regulatory compliance constraints?
  • 16. Step 1 - Requirements Analysis • These requirements must be clearly identified and analyzed • Analysis of the costs and business benefits and the provision of suitable project planning schemes are integral to step 1 – If the requirements aren’t clear, do not go forward
  • 17. Step 1 - Requirements Analysis – Project Planning • Project manager is essential – Some large-scale projects may need multiple managers • PM must be given the resources, responsibility and authority to successfully deliver the cloud project • Attempts to implement a cloud without PM have invariably resulted in failed projects
  • 18. Step 2 - Architecture Definitions • Once the requirements are known, the next step is to produce an operating model and to design the chosen cloud architecture • At this stage, cloud enabling of end user applications is also considered, allowing parallel development
  • 19. Step 2 - Architecture Definitions Create set of documentation templates and checklists to: – define how the cloud will be operated – define how trust will be passed between entities – define the cloud architecture, taking account of practical issues such as resilience, management, performance, security, scalability and current industry standards and best practices – specify what the architecture will comprise – specify how end-entity applications are to be cloud-enabled – specify how the complete cloud will be tested and supported – produce a detailed project plan
  • 20. Step 2 – Cloud architecture • Public • private • hybrid • community • What is the best architecture for you? • The one that meets your specific requirements and needs
  • 21. Step 3 Operations • Identify the policies, procedures, support issues and SLA • Organizational issues delineate who is responsible for the various parts of the cloud • Any security system is only as effective to the degree it is correctly operated – define the operating procedures and controls necessary to make sure that that the cloud security system remains effective
  • 22. Step 4 – Security Review • With any system it is important to understand where the risks are and where the system is most vulnerable – Nothing will ever be 100% secure • At this stage, the cloud is well specified and therefore it is important that the proposed system is subjected to an independent review and risk analysis and, where appropriate, corrective action is taken
  • 23. Step 4 – Security Review • The cloud is inherently unsafe and untrusted • your job is to add the controls necessary to be a safe and trusted environment
  • 24. Step 4 – Security Review • Detailed lists of the threats, vulnerabilities and countermeasures – If you have an insecure infrastructure, then you will have an insecure cloud • Creation of the system security policy provides a baseline level of security controls that must be implemented during cloud deployment
  • 25. Step 4 - Risk analysis & assessment • Effective risk assessment and analysis ensures you are worrying about the right things • Ultimate outcome of a risk analysis should be to see if you really can benefit from the product – Don’t worry about missing the bus
  • 26. Step 4 - Risk analysis & assessment • Some companies have determined at Step 4 that they really do not want to / can’t move forward • Don’t be afraid to cancel a cloud project if there is not a business need for it, or if the security risks are too great
  • 27. Step 4 – Cloud web applications • Browsers are very complicated security environments • understand how malware can thrive in a cloud environment
  • 28. Step 4 - Policy • Create and maintain policies on how you will address the many cloud security issues – identify threats to the cloud environment & its contents; ensure you address current threats – metrics for monitoring – accountability – incident response – adequate training for new/transitioned staff
  • 29. Step 4 – Shared responsibilities • Cloud provider – Responsible for security from the data center to the hypervisor • Client – Responsible for security for the operating system and all applications • But Saas, PaaS & IaaS will have different shared responsibility models
  • 30. Step 5 Integration • Integration of all the cloud components and the building of a pilot system against which all the functional, performance and operational requirements can be tested • Integration testing of any cloud-enabled applications is also performed • DR/BCP – Enterprise cloud be available 24 x 7 x 365
  • 31. Step 6 Deployment • This step involves the installation and validation of the operational cloud, followed by acceptance testing • A security review and penetration test is included to ensure that the actual implementation meets all the security requirements • Documentation is finalized and published • Acceptance testing
  • 32. Step 6 Deployment • Project closure meeting and report – Customer agrees that all planned project activities have been completed, project performance information has been captured and the cloud project is properly closed – Projects have a defined duration, but without a formal project closure activity, a project can drift and never be satisfactorily concluded
  • 33. Step 7 Post-deployment • All systems are subject to change and cloud is no exception – Well-designed cloud should be able to integrate new requirements without having to be re-engineered
  • 34. References • Cloud Computing Risk Assessment – www.enisa.europa.eu/act/rm/files/deliverables/loud-computing-risk-assessment • Security Guidance for Critical Areas of Focus – www.cloudsecurityalliance.org/csaguide.pdf • Cloud Security Guidance – www.redbooks.ibm.com/redpapers/pdfs/redp4614.pdf • Top Threats to Cloud Computing – www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf • Cloud Security and Compliance: A Primer – www.sans.org/reading_room/analysts_program/mcafee_carbird_08_2010.pdf
  • 35. Conclusion • Cloud computing is a powerful platform • But don’t attempt to roll-out an enterprise- wide cloud without a well-defined plan and adequate security requirements
  • 36. Contact information • Ben Rothke, CISSP CISA • Senior Security Consultant • BT Professional Services • ben.rothke@bt.com • www.linkedin.com/in/benrothke • www.twitter.com/benrothke • www.slideshare.net/benrothke
  • 37. Click on the questions tab on your screen, type in your question, name and e-mail address; then hit submit.