Soumettre la recherche
Mettre en ligne
CSA Concepts of Sovereignty & Cloud User Rights
•
1 j'aime
•
582 vues
CloudSecurityAllianceAustralia
Suivre
Cloud Security Alliance
Lire moins
Lire la suite
Technologie
Actualités & Politique
Business
Signaler
Partager
Signaler
Partager
1 sur 32
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
Doug Newdick
SecuringAWirelessNetwork_Capstone
SecuringAWirelessNetwork_Capstone
Cecil Sellars
Legal update 21 september 2012
Legal update 21 september 2012
Rachel Aldighieri
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
ARMA International
Case Studies M86 Security - Ernst & Young (Web Security)
Case Studies M86 Security - Ernst & Young (Web Security)
INSPIRIT BRASIL
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
Cisco Security
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
Neil Curran MSc CISSP CRISC CGEIT CISM CISA
Learning from History
Learning from History
Brian Honan
Recommandé
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
Doug Newdick
SecuringAWirelessNetwork_Capstone
SecuringAWirelessNetwork_Capstone
Cecil Sellars
Legal update 21 september 2012
Legal update 21 september 2012
Rachel Aldighieri
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...
ARMA International
Case Studies M86 Security - Ernst & Young (Web Security)
Case Studies M86 Security - Ernst & Young (Web Security)
INSPIRIT BRASIL
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
Cisco Security
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
Neil Curran MSc CISSP CRISC CGEIT CISM CISA
Learning from History
Learning from History
Brian Honan
The GDPR and What It Means to You
The GDPR and What It Means to You
Delphix
Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major Update
Delphix
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
NetworkCollaborators
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
NetworkCollaborators
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
NetworkCollaborators
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
Puneet Kukreja
A rede como um sensor de segurança
A rede como um sensor de segurança
Cisco do Brasil
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
Robb Boyd
Security of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIP
EnergySec
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
NetworkCollaborators
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
Nur Shiqim Chok
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
Jisc
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines - security keynote
NetworkCollaborators
Cloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
David Sweigert
Cyber supply chain risk management ASDE
Cyber supply chain risk management ASDE
Engineers Australia
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
Shane Glenn
Internet of everything
Internet of everything
Jayesh Pai
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
PECB
Cloud security and cloud adoption public
Cloud security and cloud adoption public
John Mathon
Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
CloudSecurityAllianceAustralia
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
InnoTech
Contenu connexe
Tendances
The GDPR and What It Means to You
The GDPR and What It Means to You
Delphix
Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major Update
Delphix
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
NetworkCollaborators
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
NetworkCollaborators
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
NetworkCollaborators
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
Puneet Kukreja
A rede como um sensor de segurança
A rede como um sensor de segurança
Cisco do Brasil
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
Robb Boyd
Security of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIP
EnergySec
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
NetworkCollaborators
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
Nur Shiqim Chok
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
Jisc
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines - security keynote
NetworkCollaborators
Cloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
David Sweigert
Cyber supply chain risk management ASDE
Cyber supply chain risk management ASDE
Engineers Australia
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
Shane Glenn
Internet of everything
Internet of everything
Jayesh Pai
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
PECB
Cloud security and cloud adoption public
Cloud security and cloud adoption public
John Mathon
Tendances
(20)
The GDPR and What It Means to You
The GDPR and What It Means to You
Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major Update
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
A rede como um sensor de segurança
A rede como um sensor de segurança
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
Security of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIP
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines - security keynote
Cloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
Cyber supply chain risk management ASDE
Cyber supply chain risk management ASDE
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
Internet of everything
Internet of everything
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Cloud security and cloud adoption public
Cloud security and cloud adoption public
Similaire à CSA Concepts of Sovereignty & Cloud User Rights
Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
CloudSecurityAllianceAustralia
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
InnoTech
IRISSCON 2014 Privacy Cloud Computing
IRISSCON 2014 Privacy Cloud Computing
Paul Hogan
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
Cyren, Inc
CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution Overview
CipherCloud
NIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric Security
Seclore
Cloud security - Publication
Cloud security - Publication
Bianca Mueller, LL.M.
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
Cyren, Inc
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Phil Agcaoili
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Cyren, Inc
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
promediakw
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
CloudMask inc.
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec
Why CSA Australia
Why CSA Australia
CloudSecurityAllianceAustralia
Internet of Things and new security challenges for the IT industry
Internet of Things and new security challenges for the IT industry
Martin von Haller Groenbaek
Cloud security management by newvem
Cloud security management by newvem
Newvewm
Secure Cloud For Legal Professionals
Secure Cloud For Legal Professionals
ZitaAdlTrk
How to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an Hour
Cyren, Inc
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updated
HarshitParkar6677
Understanding the Cloud: a guide for financial businesses
Understanding the Cloud: a guide for financial businesses
Sentronex
Similaire à CSA Concepts of Sovereignty & Cloud User Rights
(20)
Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
IRISSCON 2014 Privacy Cloud Computing
IRISSCON 2014 Privacy Cloud Computing
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution Overview
NIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric Security
Cloud security - Publication
Cloud security - Publication
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Why CSA Australia
Why CSA Australia
Internet of Things and new security challenges for the IT industry
Internet of Things and new security challenges for the IT industry
Cloud security management by newvem
Cloud security management by newvem
Secure Cloud For Legal Professionals
Secure Cloud For Legal Professionals
How to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an Hour
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Understanding the Cloud: a guide for financial businesses
Understanding the Cloud: a guide for financial businesses
Dernier
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Zilliz
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Deepika Singh
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Sandro Moreira
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
apidays
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Angeliki Cooney
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Nanddeep Nachan
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vázquez
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Bhuvaneswari Subramani
Dernier
(20)
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Architecting Cloud Native Applications
Architecting Cloud Native Applications
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Elevate Developer Efficiency & build GenAI Application with Amazon Q
CSA Concepts of Sovereignty & Cloud User Rights
1.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security Alliance Rizwan Ahmad Chair Data Governance, CSA, CEO NZCSA, Senior Lecturer MIT
2.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Global, not-for-profit organization Members Over 49,000 individual members 200 corporate members 70 chapters worldwide Established with the aim of bringing trust to the cloud 30 research groups with 25 research projects
3.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Over 300 hundred members Main focus is research in Data governance Privacy Cloud Assurance Cloud Auditing
4.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security Alliance Sir Winston Churchill
5.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Preservation of sovereignty is a Noble cause Enshrined in constitutions, Legislation and Patriotism To preserve peace To protect territory against the hostile elements To protect its citizens To guarantee freedom
6.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Countries take various steps to preserve sovereignty of the state without infringing the rights of his/her own citizens through Proactive actions Reactive actions
7.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Legal or not Legal? Sovereignty of State Reactive Police Military Proactive Intelligence Agencies Counter Operational
8.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Government develops legislative measures to enhance these agencies by National security laws meant to protect citizen’s Fundamental rights Freedom Democracy Country
9.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security Alliance
10.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Various covert and overt operations are under fire These operations reflect national security but overrides fundamental rights (Globalization) Operations take strength from legislation
11.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter These programs and legislations are not new
12.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Country National Security Laws Tolerance USA Foreign Intelligence Security Act (FISA) PATRIOT ACT Justifies PRISM Zero tolerance for Foreigners US Citizens safe UK Regulation of Investigatory Powers Act 2000 section 22(2) Telecommunications Act 1984 section 94 Tempora Program targets Citizens and Non Citizens Sweden Act 2008:717 on signals intelligence within defence intelligence operations Act 2009:966 on the Intelligence Court Decree 2009:968 Gathering information Has some weakness France Code de la Sécurité Intérieure Book 2, Title IV of this Code. Anti-Terror Act 2006 CNCIS Targeted surveillance Extends powers to gather telecom data directly from providers
13.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Country National Security Laws Tolerance Germany G-10 Law Warrantless automated wiretaps of domestic and international Communications Netherlands Dutch Intelligence and Security Act 2002 Does not permit wiretap European Union Directive 95/46/EC, Article 13 Exemption to data protection European Union Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data Exemption in Article 9 and Article 16 International Convention on Cybercrime Article 27 and 30
14.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Country User Data Requests Percentage of requests where some data produced Users/Accounts Specified Total > 27477 64% > 42648 United States 10,574 83% 18,254 France 2,750 51% 3,378 Germany 2,660 40% 3,255 India 2,513 66% 4,401 United Kingdom 1,397 69% 3,142 Brazil 1,085 49% 1,471 Italy 896 42% 1,084 Australia 780 70% 944 Singapore 755 68% 847 Spain 545 53% 761 Poland 502 23% 740
15.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security Alliance Survey on PRISM
16.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter 56%31% 10% 3% Survey 207 responses Less No impact Cancelled More
17.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter 47% 32% 11% 10% Survey Results of 440 responses Poor Fair No Idea Excellent
18.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter 36% 64% Survey Results 220 responses Yes No
19.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter 41% 46% 13% Survey Results 423 responses Patriot Act Repealed Patriot Act Modified Patriot Act is Fine
20.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter 91% 9% Survey Results 438 Yes No
21.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter User rights are aggravated by Lack of transparency manifested by the cloud service providers and governments Inadequate cloud security standards Evolving nature of cloud computing Risks Jurisdictional laws and conflicts
22.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security Alliance Universal principles
23.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Article II 3(b), (c), (d) and (e) United Nations Guidelines for Consumer Protection (b) The promotion and protection of the economic interests of consumers; (c) Access of consumers to adequate information to enable them to make informed choices according to individual wishes and needs; (d) Consumer education, including education on the environmental, social and economic impacts of consumer choice (e) Availability of effective consumer redress.
24.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Transparency • What information is disclosed by CSP Legal Protection • What legal protection is offered? Compliance • What standards and laws? Accountability • How grievance is addressed? Cloud Governance
25.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Right to know reforms….. Disclosure of information to inform cloud user that impact his data rights related to Jurisdiction Legal issues Data protection laws Compliance to relevant policies, law enforcement Redress, complains
26.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Assess legal and jurisdictional risks Contracts must be enforceable Flexible contracts to allow cloud user requirements Choice of court Arbitration Ensure data protection under cloud user laws
27.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Cloud Service provider displays compliance to Relevant provisions of laws Security standards, best practices Legal protection not to show data to third party Transparency, legal protection and compliance to standards show accountability
28.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Cloud service provider displays information to show Accountability processes Breach of security Electronic dispute resolution Liability Choice of court
29.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Four Elements Transparency ISO 27001 CCM SSAE 16 SOC2 Type 2/ ISAE 3402 STAR Registry (CAIQ, CCM) Disclosure of laws Breach notification Legal Protection Choice of court Flexible contracts Enforceable contracts Compliance Standards Contracts User laws Accountability Liability Dispute resolution
30.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter Foundation for data governance Need your cooperation to build strong research Presenting a proposal for new standards on data sovereignity
31.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security AllianceCopyright © 2014 Cloud Security Alliance New Zealand Chapter r.ahmad@cloudsecurityalliance.org.nz Join Hands for Cloud and Cyber Security to Secure Community
32.
www.cloudsecurityalliance.orgCopyright © 2012
New Zealand Cloud Security Alliance Thankyou
Télécharger maintenant