SlideShare une entreprise Scribd logo
1  sur  45
Télécharger pour lire hors ligne
CLOUD COMPUTING RISK
MANAGEMENT
SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE


George Thomas, SVP Internal Audit – First Data Corp
Brian Dickard, Director Internal Audit – First Data Corp
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                                                 AGENDA

•    Introduction
•    Terminology and Stats
•    Major Public Cloud Services
•    Assessing Public Cloud Risk
•    Trends and Issues
•    Concluding Remarks



                                                                                         2
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                                       INTRODUCTION

• First Data Vision
       – To shape the future of global commerce by
         delivering the world’s most secure and
         innovative payment solutions




                                                                                         3
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




            CLOUD COMPUTING – WHAT IS IT?

• Where did it come from?
• Why should I care as a business
  manager?
• What types of risk are there?
• How does it work?




                                                                                         4
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




         CLOUD COMPUTING – HOW DOES IT
                   WORK?
• Understanding Cloud Computing
• Managing the risks




                                                                                         5
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                                POLLING QUESTION

• How familiar are you with the major Cloud
  Service and Deployment models
       – A. Very familiar
       – B. Somewhat familiar
       – C. I’ve heard of them
       – D. Not familiar at all




                                                                                         6
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                ESSENTIAL CHARACTERISTICS

•    Resource Pooling
•    Broad Network Access
•    Rapid Elasticity
•    Measured Service
•    On Demand Self Service




                                                                                         7
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                        CLOUD SERVICE MODELS

• Infrastructure as a Service (IaaS)
       – “Raw” Servers, Disk Space, Network
       – Ex. Amazon Elastic Cloud Computing (EC2)
       – Foundational to PaaS and SaaS
       – Security (other than physical) provided by
         cloud consumer




                                                                                         8
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                        CLOUD SERVICE MODELS

• Platform as a Service (PaaS)
       – Middleware and application development
         frameworks supported by provider
       – Cloud-deployed applications created and
         supported by consumer
       – Ex. Google App Engine
       – Built on top of IaaS
       – Security must be built in by developer
         (provider or consumer)
                                                                                         9
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                        CLOUD SERVICE MODELS

• Software as a Service (SaaS)
       – “On Demand” application availability
       – Software and data hosted by provider
       – Accessed with a web browser
       – Ex. Gmail
       – Built on top of IaaS and PaaS
       – Highest provider security level



                                                                                         10
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                          CLOUD SERVICE LAYERS



Increasing                                                SaaS
consumer
configuration
options



                                                         PaaS
                                                                                          Increasing
                                                                                          provider
                                                                                          security
                                                          IaaS

                                                                                               11
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




  IN-HOUSE IT ASSETS VS. “SPI” SERVICES
              In-House Attributes                                                 SPI Attributes


                          Fixed                                                          Elastic
          Overhead or Chargeback                                                         Metered
                 Service Request                                                    Self Service
         Private Network Accessible                                           Internet Accessible
                      Dedicated                                                          Shared




                                                                                                    12
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                            DEPLOYMENT MODELS
• Public Cloud
       – More than one organization shares common IT
         resources
• Private Cloud
       – An organization buys and deploys its own IT
         resources - OR –
       – Contracts exclusive arrangement with a 3rd party
• Community Cloud
       – Usage of public cloud by common mission or cause
       – Ex. State or Local governments
• Hybrid Cloud
       – Some elements of all three

                                                                                         13
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                             POTENTIAL BENEFITS

• Pay as you go model (low fixed cost)
• Remote access
• Rapid scalability
• Quicker deployment of IT-enabled
  strategies
• Stay current on technology upgrades
• Resiliency / Redundancy

                                                                                         14
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




    WHERE PRIVATE CLOUDS MAKE SENSE

• Large Corporate Data Center
       – High rate of optimization through virtualization
       – Diversity of apps are coded to run using
         common O/S, database and network
       – Apps are “swapped out” on common
         hardware based on processing load
       – Same hardware that runs mission critical app
         may also run support app in non-peak time
       – “Workload Agnostic Computing”
                                                                                         15
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                           VIRTUALIZATION STATS
• InfoWeek Poll – Major Corporations
       – 97% use Server Virtualization extensively or
         on a limited basis (ex. VMWare vSphere)
       – 57% use Storage Virtualization (ex. NetApp)
       – 44% use Desktop Virtualization (ex. Citrix)
       – 42% use Application Virtualization (ex.
         Vmware ThinApp)
       – 37% use I/O Virtualization (ex. Cisco VFrame)
       – 30% use Network Virtualization (ex. Nicira
         Networks “DVNI”)
                                                                                         16
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




     WHERE PUBLIC CLOUDS MAKE SENSE
• Businesses of any size where captive IT resources
  aren’t cost effective or available
       – Fixed capital expense becomes variable operating
         expense
       – Can quickly level the playing field for small and
         medium sized businesses
• “Cloud Bursting”
       – Adding incremental capacity to meet peak or
         seasonal demands
• Prototyping
       – Running simulations to determine in-house data
         center capacity needs

                                                                                         17
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                                POLLING QUESTION

• Describe your usage of Public Cloud
  infrastructure
       – A. Active production deployment
       – B. Evaluating or budgeted plans for
         production deployment
       – C. No plans for Public Cloud deployment
       – D. Don’t know



                                                                                         18
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                            PUBLIC CLOUD PLANS

• Infoweek Survey
       – 26% plan to deploy in the next year
       – 38% have no plans to deploy
       – 11% already have public deployment
• Are you sure?
       – DR scenario: private cloud becomes public




                                                                                         19
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




             ESSENCE OF THE PUBLIC CLOUD
                      DECISION

• A thoughtfully considered* decision to
  move one of the following into the public
  cloud domain:
       – Data
              • Essential to map your data and understand
                whether, and how, it flows in and out of the cloud
              • Important to classify low value, high value
                regulated and high value unregulated assets
       – Transactions/Processing

                                                                                         20
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




          THOUGHTFULLY CONSIDER - HOW?
• How would you be harmed if:
       – The asset became widely public or widely
         distributed?
       – An employee of the cloud provider accessed the
         asset?
       – The process or function was manipulated by an
         outsider?
       – The process or function failed to provide the
         expected results?
       – The information/data was unexpectedly changed?
       – The asset were unavailable for a period of time?


                                                                                         21
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




               TOP PUBLIC CLOUD CONCERNS

• Data Security
       – Assurance framework
• Reliability / Availability
• Integration with Existing Systems
• Loss of Control




                                                                                         22
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                       A GROWING OPPORTUNITY
                                                     Revenue
                 70
                 60
                 50
                 40
                 30                                                                      Revenue
                 20
                 10
                   0
                         2008 2009 2010 2011 2012 2013


•    Revenue from "public cloud" services, in billions of dollars. Source: Forrester Research


                                                                                                   23
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




 MAJOR PUBLIC CLOUD SERVICE PROVIDERS




                                                                                         24
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                                POLLING QUESTION

• Do you see a vendor on the previous slide,
  who is used by your company, but you
  were unaware they were a provider of
  cloud services?
       – A. Yes
       – B. No




                                                                                         25
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                      APPLICABLE COMPLIANCE
                          CERTIFICATIONS
• SSAE-16, SOC-1,2,3
       – Financial Reporting and service oriented controls
       – Focused on integrity
• ISO 9002
       – Quality oriented controls
       – Focused on process
• ISO 27001 /27002
       – Security oriented controls
       – Focused on security
• TIA 942 (Telecommunications Industry Association)
       – Data center fault tolerant controls
       – Focused on resilience


                                                                                         26
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




            PII BREACH BY CLOUD PROVIDER
• Could subject them to violations under the
  following privacy laws:
       – Privacy and safeguard rules under GLBA
       – PCI-DSS data transmission and storage security
         provisions
       – HIPAA restrictions on sharing health care data
       – Breach provisions under the HITECH Act
• Depends on provider’s contract provisions
• You can’t outsource your accountability for
  information security
                                                                                         27
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                    ASSURANCE FRAMEWORKS
• Cloud Security Alliance (CSA)
       – Cloud Controls Matrix
       – https://cloudsecurityalliance.org

• Information Systems Audit and Control Association (ISACA)
       – Cloud Computing Management Audit/Assurance Program
       – http://www.isaca.org/Knowledge-
         Center/Research/ResearchDeliverables/Pages/Cloud-
         Computing-Management-Audit-Assurance-Program.aspx

• European Network and Information Security Agency (ENISA)
       – Cloud Computing Security Risk Assessment
       – http://www.enisa.europa.eu/activities/risk-
         management/files/deliverables/cloud-computing-risk-assessment


                                                                                         28
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                    CLOUD SECURITY ALLIANCE
• GRC “Stack”
       –   Cloud Controls Matrix
       –   Consensus Assessments Initiative
       –   Cloud Audit
       –   Cloud Trust Protocol


       – Designed to support both cloud consumers and cloud
         providers
       – Created to capture value from the cloud as well as
         support compliance and control within the cloud

                                 © 2011 Cloud Security Alliance, Inc. All rights reserved   29
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                                            GRC STACK
• Cloud Controls Matrix
       – Fundamental security principles in specifying the
         overall security needs of a cloud consumer and
         assessing the overall security risk of a cloud provider
       – What control requirements should I have as a cloud
         consumer or cloud provider?
• Consensus Assessments Initiative
       – Industry-accepted ways to document what security
         controls exist
       – How do I ask about the control requirements that are
         satisfied (consumer) or express my claim of control
         response (provider)?
                                 © 2011 Cloud Security Alliance, Inc. All rights reserved   30
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                                            GRC STACK
• Cloud Audit
       – Common interface and namespace to automate the Audit,
         Assertion, Assessment, and Assurance of cloud
         environments
       – How do I announce and automate my claims of audit
         support for all of the various compliance mandates and
         control obligations?
• Cloud Trust Protocol
       – Common technique and nomenclature to request and
         receive evidence and affirmation of current cloud service
         operating circumstances from cloud provider
       – How do I know that the controls I need are working for me
         (consumer)? How do I provide actual security and
         transparency of service to all of my cloud users (provider)?

                                 © 2011 Cloud Security Alliance, Inc. All rights reserved   31
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                      CLOUD CONTROLS MATRIX
Controls base-lined and mapped to:
      – BITS Shared Assessments
      – COBIT
      – FedRAMP
      – HIPAA/HITECH Act
      – ISO/IEC 27001-2005
      – Jericho Forum
      – NERC CIP
      – NIST SP800-53
      – PCI DSSv2.0
                                 © 2011 Cloud Security Alliance, Inc. All rights reserved   32
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




       CLOUD CONTROL MATRIX - DOMAINS
       1. Compliance (CO)                                           7. Operations Management
                                                                        (OM)
       2. Data Governance (DG)
                                                                    8. Risk Management (RI)
       3. Facility Security (FS)
                                                                    9. Release Management (RM)
       4. Human Resources (HR)
                                                                    10. Resiliency (RS)
       5. Information Security (IS)
                                                                    11. Security Architecture (SA)
       6. Legal (LG)




                                 © 2011 Cloud Security Alliance, Inc. All rights reserved            33
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                                    CCM - CONTROLS




                                 © 2011 Cloud Security Alliance, Inc. All rights reserved   34
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                       CCM – CONTROLS (CONT.)




                                 © 2011 Cloud Security Alliance, Inc. All rights reserved   35
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                       CCM – CONTROLS (CONT.)




                                 © 2011 Cloud Security Alliance, Inc. All rights reserved   36
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                       CCM – CONTROLS (CONT.)




                                 © 2011 Cloud Security Alliance, Inc. All rights reserved   37
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




         CLOUD CONTROL MATRIX - SAMPLE




                                                                                            38
                                 © 2011 Cloud Security Alliance, Inc. All rights reserved
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




  WHAT DO YOU DO WITH A COMPLETED
                   CCM?
• Consumer: As an internal assessment tool
       – Log exceptions and draft a report of provider’s
         level of control maturity or a gap analysis
• Provider: As a public assertion of control
  maturity
       – CSA STAR (Security, Trust and Assurance
         Registry)

       – Trusted Cloud Initiative
              • www.cloudsecurityalliance.org/trustedcloud.html

                                 © 2011 Cloud Security Alliance, Inc. All rights reserved   39
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                                POLLING QUESTION
• Regarding the Cloud Security Alliance Cloud
  Control Matrix:
       – A. I am familiar with the CSA and CCM and have
         used the framework to assess cloud service
         providers.
       – B. I am familiar with the framework but have yet
         to use it.
       – C. I have not previously heard of the framework
         but think it might be useful.
       – D. I don’t think this framework is applicable to my
         company’s assessment of cloud service
         providers.

                                                                                         40
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




         INTEGRATION TRENDS / CONCERNS

• “Bring Your Own Device” (BYOD)
       – Smartphone, tablet, laptop


• “Bring Your Own Cloud” (BYOC)
       – Google Docs, Dropbox, iCloud, Skydrive




                                                                                         41
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                       “DATA AWARE” SECURITY

• Information Security trend
• Knowing if a particular combination of
  user, device, and software can be trusted
  with access to specific information
• Challenge: Encoding this security
  intelligence into your data before you store
  it in the public cloud


                                                                                         42
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                                                   RECAP

• Cloud computing has tangible benefits and
  could be a strategic differentiator
• Your organization may be more actively
  deployed to the “cloud” than you realize
• New risks are introduced, but can be
  managed with assurance frameworks



                                                                                         43
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                                          QUESTIONS?


• George.Thomas@firstdata.com

• Brian.Dickard@firstdata.com




                                                                                         44
CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE




                                         REFERENCES
• Cloud Security Alliance
       – Security Guidance For Critical Areas of Focus in
         Cloud Computing V3.0 (2011)
              • https://cloudsecurityalliance.org/research/security-
                guidance/
       – Cloud Security Alliance GRC Stack (2011)
              • https://cloudsecurityalliance.org/research/grc-stack/
       – Cloud Security Alliance Cloud Controls Matrix
         V1.1 (2010)
              • https://cloudsecurityalliance.org/research/ccm/
• Information Week (Jan-Mar 2012)
• MIT Technology Review (Jan-Mar 2012)
                                                                                         45

Contenu connexe

Tendances

Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Cloud Migration Strategy and Best Practices
Cloud Migration Strategy and Best PracticesCloud Migration Strategy and Best Practices
Cloud Migration Strategy and Best PracticesQBurst
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacytmather
 
Cloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCAST
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 
Cloud computing understanding security risk and management
Cloud computing   understanding security risk and managementCloud computing   understanding security risk and management
Cloud computing understanding security risk and managementShamsundar Machale (CISSP, CEH)
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Cloud computing risk assesment
Cloud computing risk assesment Cloud computing risk assesment
Cloud computing risk assesment Ahmad El Tawil
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security DemystifiedMichael Torres
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsKannan Subbiah
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptxMoshe Ferber
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
 
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Timothy McAliley
 

Tendances (20)

Cloud Security Fundamentals Webinar
Cloud Security Fundamentals WebinarCloud Security Fundamentals Webinar
Cloud Security Fundamentals Webinar
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Cloud Migration Strategy and Best Practices
Cloud Migration Strategy and Best PracticesCloud Migration Strategy and Best Practices
Cloud Migration Strategy and Best Practices
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacy
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case Study
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Cloud computing understanding security risk and management
Cloud computing   understanding security risk and managementCloud computing   understanding security risk and management
Cloud computing understanding security risk and management
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud computing risk assesment
Cloud computing risk assesment Cloud computing risk assesment
Cloud computing risk assesment
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security Demystified
 
Multi Cloud Architecture Approach
Multi Cloud Architecture ApproachMulti Cloud Architecture Approach
Multi Cloud Architecture Approach
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security Concerns
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud ppt
Cloud pptCloud ppt
Cloud ppt
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

En vedette

Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management Padma Jella
 
Cloud Computing Powerpoint
Cloud Computing PowerpointCloud Computing Powerpoint
Cloud Computing Powerpointthomaslipkin
 
Cloud Computing - A Pragmatic Approach to Cloud Adoption
Cloud Computing - A Pragmatic Approach to Cloud AdoptionCloud Computing - A Pragmatic Approach to Cloud Adoption
Cloud Computing - A Pragmatic Approach to Cloud AdoptionBob Rhubart
 
Tom Canavan Joomla Security and Disaster Recovery
Tom Canavan Joomla Security and Disaster RecoveryTom Canavan Joomla Security and Disaster Recovery
Tom Canavan Joomla Security and Disaster RecoveryJohn Coonen
 
Security&disaster plan
Security&disaster planSecurity&disaster plan
Security&disaster plansabaArshed
 
#OOW16 - Risk Management Cloud / GRC General Session
#OOW16 - Risk Management Cloud / GRC General Session#OOW16 - Risk Management Cloud / GRC General Session
#OOW16 - Risk Management Cloud / GRC General SessionDane Roberts
 
Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...
Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...
Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...Simone Brunozzi
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak
 
Journey Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster RecoveryJourney Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster RecoveryAmazon Web Services
 
AWS Journey through the AWS Cloud: Disaster Recovery
AWS Journey through the AWS Cloud: Disaster RecoveryAWS Journey through the AWS Cloud: Disaster Recovery
AWS Journey through the AWS Cloud: Disaster RecoveryAmazon Web Services
 
Ict In Disaster Risk Reduction India Case
Ict In Disaster Risk Reduction  India CaseIct In Disaster Risk Reduction  India Case
Ict In Disaster Risk Reduction India CaseSujit Mohanty
 
It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery Brian Pichman
 
Alliance session 4373 risk management from on premise to the cloud – a foc...
Alliance session 4373    risk management from on premise to the cloud – a foc...Alliance session 4373    risk management from on premise to the cloud – a foc...
Alliance session 4373 risk management from on premise to the cloud – a foc...Smart ERP Solutions, Inc.
 
Disaster recovery and the cloud
Disaster recovery and the cloudDisaster recovery and the cloud
Disaster recovery and the cloudJason Dea
 
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | SysforeCloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | SysforeSysfore Technologies
 
Alliance 2017 3891-University of California | Office of The President People...
Alliance 2017  3891-University of California | Office of The President People...Alliance 2017  3891-University of California | Office of The President People...
Alliance 2017 3891-University of California | Office of The President People...Smart ERP Solutions, Inc.
 

En vedette (17)

Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
 
Cloud Computing Powerpoint
Cloud Computing PowerpointCloud Computing Powerpoint
Cloud Computing Powerpoint
 
Cloud Computing - A Pragmatic Approach to Cloud Adoption
Cloud Computing - A Pragmatic Approach to Cloud AdoptionCloud Computing - A Pragmatic Approach to Cloud Adoption
Cloud Computing - A Pragmatic Approach to Cloud Adoption
 
Tom Canavan Joomla Security and Disaster Recovery
Tom Canavan Joomla Security and Disaster RecoveryTom Canavan Joomla Security and Disaster Recovery
Tom Canavan Joomla Security and Disaster Recovery
 
Security&disaster plan
Security&disaster planSecurity&disaster plan
Security&disaster plan
 
#OOW16 - Risk Management Cloud / GRC General Session
#OOW16 - Risk Management Cloud / GRC General Session#OOW16 - Risk Management Cloud / GRC General Session
#OOW16 - Risk Management Cloud / GRC General Session
 
Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...
Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...
Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
 
Cloud security
Cloud security Cloud security
Cloud security
 
Journey Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster RecoveryJourney Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster Recovery
 
AWS Journey through the AWS Cloud: Disaster Recovery
AWS Journey through the AWS Cloud: Disaster RecoveryAWS Journey through the AWS Cloud: Disaster Recovery
AWS Journey through the AWS Cloud: Disaster Recovery
 
Ict In Disaster Risk Reduction India Case
Ict In Disaster Risk Reduction  India CaseIct In Disaster Risk Reduction  India Case
Ict In Disaster Risk Reduction India Case
 
It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery
 
Alliance session 4373 risk management from on premise to the cloud – a foc...
Alliance session 4373    risk management from on premise to the cloud – a foc...Alliance session 4373    risk management from on premise to the cloud – a foc...
Alliance session 4373 risk management from on premise to the cloud – a foc...
 
Disaster recovery and the cloud
Disaster recovery and the cloudDisaster recovery and the cloud
Disaster recovery and the cloud
 
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | SysforeCloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
 
Alliance 2017 3891-University of California | Office of The President People...
Alliance 2017  3891-University of California | Office of The President People...Alliance 2017  3891-University of California | Office of The President People...
Alliance 2017 3891-University of California | Office of The President People...
 

Similaire à Cloud Computing Risk Management (IIA Webinar)

Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in CloudLenin Aboagye
 
Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02abhisheknayak29
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Crew
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloudAjay Rathi
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14L S Subramanian
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simpleSameer Paradia
 
Appistry Cloud Computing for Government Featuring FedEx
Appistry Cloud Computing for Government Featuring FedExAppistry Cloud Computing for Government Featuring FedEx
Appistry Cloud Computing for Government Featuring FedExAppistry
 
PCI-DSS Compliant Cloud - Design & Architecture Best Practices
PCI-DSS Compliant Cloud - Design & Architecture Best PracticesPCI-DSS Compliant Cloud - Design & Architecture Best Practices
PCI-DSS Compliant Cloud - Design & Architecture Best PracticesHyTrust
 
Eo navigating the cloud
Eo navigating the cloudEo navigating the cloud
Eo navigating the cloudeophiladelphia
 
Eo navigating the cloud v8
Eo navigating the cloud v8Eo navigating the cloud v8
Eo navigating the cloud v8Nerve2012
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudnooralmousa
 
The Complexities of Cloud Computing - The Rules are New, But is the Game
The Complexities of Cloud Computing - The Rules are New, But is the GameThe Complexities of Cloud Computing - The Rules are New, But is the Game
The Complexities of Cloud Computing - The Rules are New, But is the GameJanine Anthony Bowen, Esq.
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementNishant Kaushik
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...Amazon Web Services
 
Big data, security, and the cloud
Big data, security, and the cloudBig data, security, and the cloud
Big data, security, and the cloudPano Xinos
 
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...ptaglephd
 

Similaire à Cloud Computing Risk Management (IIA Webinar) (20)

Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02Cloudcomputingoct2009 100301142544-phpapp02
Cloudcomputingoct2009 100301142544-phpapp02
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
 
MISA Cloud workshop - Cloud 101
MISA Cloud workshop - Cloud 101MISA Cloud workshop - Cloud 101
MISA Cloud workshop - Cloud 101
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simple
 
Appistry Cloud Computing for Government Featuring FedEx
Appistry Cloud Computing for Government Featuring FedExAppistry Cloud Computing for Government Featuring FedEx
Appistry Cloud Computing for Government Featuring FedEx
 
PCI-DSS Compliant Cloud - Design & Architecture Best Practices
PCI-DSS Compliant Cloud - Design & Architecture Best PracticesPCI-DSS Compliant Cloud - Design & Architecture Best Practices
PCI-DSS Compliant Cloud - Design & Architecture Best Practices
 
Eo navigating the cloud
Eo navigating the cloudEo navigating the cloud
Eo navigating the cloud
 
Eo navigating the cloud v8
Eo navigating the cloud v8Eo navigating the cloud v8
Eo navigating the cloud v8
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloud
 
The Complexities of Cloud Computing - The Rules are New, But is the Game
The Complexities of Cloud Computing - The Rules are New, But is the GameThe Complexities of Cloud Computing - The Rules are New, But is the Game
The Complexities of Cloud Computing - The Rules are New, But is the Game
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity Management
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
 
Big data, security, and the cloud
Big data, security, and the cloudBig data, security, and the cloud
Big data, security, and the cloud
 
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
 
Cloud security v2
Cloud security v2Cloud security v2
Cloud security v2
 

Cloud Computing Risk Management (IIA Webinar)

  • 1. CLOUD COMPUTING RISK MANAGEMENT SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE George Thomas, SVP Internal Audit – First Data Corp Brian Dickard, Director Internal Audit – First Data Corp
  • 2. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE AGENDA • Introduction • Terminology and Stats • Major Public Cloud Services • Assessing Public Cloud Risk • Trends and Issues • Concluding Remarks 2
  • 3. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE INTRODUCTION • First Data Vision – To shape the future of global commerce by delivering the world’s most secure and innovative payment solutions 3
  • 4. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE CLOUD COMPUTING – WHAT IS IT? • Where did it come from? • Why should I care as a business manager? • What types of risk are there? • How does it work? 4
  • 5. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE CLOUD COMPUTING – HOW DOES IT WORK? • Understanding Cloud Computing • Managing the risks 5
  • 6. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE POLLING QUESTION • How familiar are you with the major Cloud Service and Deployment models – A. Very familiar – B. Somewhat familiar – C. I’ve heard of them – D. Not familiar at all 6
  • 7. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE ESSENTIAL CHARACTERISTICS • Resource Pooling • Broad Network Access • Rapid Elasticity • Measured Service • On Demand Self Service 7
  • 8. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE CLOUD SERVICE MODELS • Infrastructure as a Service (IaaS) – “Raw” Servers, Disk Space, Network – Ex. Amazon Elastic Cloud Computing (EC2) – Foundational to PaaS and SaaS – Security (other than physical) provided by cloud consumer 8
  • 9. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE CLOUD SERVICE MODELS • Platform as a Service (PaaS) – Middleware and application development frameworks supported by provider – Cloud-deployed applications created and supported by consumer – Ex. Google App Engine – Built on top of IaaS – Security must be built in by developer (provider or consumer) 9
  • 10. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE CLOUD SERVICE MODELS • Software as a Service (SaaS) – “On Demand” application availability – Software and data hosted by provider – Accessed with a web browser – Ex. Gmail – Built on top of IaaS and PaaS – Highest provider security level 10
  • 11. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE CLOUD SERVICE LAYERS Increasing SaaS consumer configuration options PaaS Increasing provider security IaaS 11
  • 12. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE IN-HOUSE IT ASSETS VS. “SPI” SERVICES In-House Attributes SPI Attributes Fixed Elastic Overhead or Chargeback Metered Service Request Self Service Private Network Accessible Internet Accessible Dedicated Shared 12
  • 13. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE DEPLOYMENT MODELS • Public Cloud – More than one organization shares common IT resources • Private Cloud – An organization buys and deploys its own IT resources - OR – – Contracts exclusive arrangement with a 3rd party • Community Cloud – Usage of public cloud by common mission or cause – Ex. State or Local governments • Hybrid Cloud – Some elements of all three 13
  • 14. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE POTENTIAL BENEFITS • Pay as you go model (low fixed cost) • Remote access • Rapid scalability • Quicker deployment of IT-enabled strategies • Stay current on technology upgrades • Resiliency / Redundancy 14
  • 15. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE WHERE PRIVATE CLOUDS MAKE SENSE • Large Corporate Data Center – High rate of optimization through virtualization – Diversity of apps are coded to run using common O/S, database and network – Apps are “swapped out” on common hardware based on processing load – Same hardware that runs mission critical app may also run support app in non-peak time – “Workload Agnostic Computing” 15
  • 16. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE VIRTUALIZATION STATS • InfoWeek Poll – Major Corporations – 97% use Server Virtualization extensively or on a limited basis (ex. VMWare vSphere) – 57% use Storage Virtualization (ex. NetApp) – 44% use Desktop Virtualization (ex. Citrix) – 42% use Application Virtualization (ex. Vmware ThinApp) – 37% use I/O Virtualization (ex. Cisco VFrame) – 30% use Network Virtualization (ex. Nicira Networks “DVNI”) 16
  • 17. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE WHERE PUBLIC CLOUDS MAKE SENSE • Businesses of any size where captive IT resources aren’t cost effective or available – Fixed capital expense becomes variable operating expense – Can quickly level the playing field for small and medium sized businesses • “Cloud Bursting” – Adding incremental capacity to meet peak or seasonal demands • Prototyping – Running simulations to determine in-house data center capacity needs 17
  • 18. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE POLLING QUESTION • Describe your usage of Public Cloud infrastructure – A. Active production deployment – B. Evaluating or budgeted plans for production deployment – C. No plans for Public Cloud deployment – D. Don’t know 18
  • 19. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE PUBLIC CLOUD PLANS • Infoweek Survey – 26% plan to deploy in the next year – 38% have no plans to deploy – 11% already have public deployment • Are you sure? – DR scenario: private cloud becomes public 19
  • 20. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE ESSENCE OF THE PUBLIC CLOUD DECISION • A thoughtfully considered* decision to move one of the following into the public cloud domain: – Data • Essential to map your data and understand whether, and how, it flows in and out of the cloud • Important to classify low value, high value regulated and high value unregulated assets – Transactions/Processing 20
  • 21. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE THOUGHTFULLY CONSIDER - HOW? • How would you be harmed if: – The asset became widely public or widely distributed? – An employee of the cloud provider accessed the asset? – The process or function was manipulated by an outsider? – The process or function failed to provide the expected results? – The information/data was unexpectedly changed? – The asset were unavailable for a period of time? 21
  • 22. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE TOP PUBLIC CLOUD CONCERNS • Data Security – Assurance framework • Reliability / Availability • Integration with Existing Systems • Loss of Control 22
  • 23. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE A GROWING OPPORTUNITY Revenue 70 60 50 40 30 Revenue 20 10 0 2008 2009 2010 2011 2012 2013 • Revenue from "public cloud" services, in billions of dollars. Source: Forrester Research 23
  • 24. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE MAJOR PUBLIC CLOUD SERVICE PROVIDERS 24
  • 25. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE POLLING QUESTION • Do you see a vendor on the previous slide, who is used by your company, but you were unaware they were a provider of cloud services? – A. Yes – B. No 25
  • 26. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE APPLICABLE COMPLIANCE CERTIFICATIONS • SSAE-16, SOC-1,2,3 – Financial Reporting and service oriented controls – Focused on integrity • ISO 9002 – Quality oriented controls – Focused on process • ISO 27001 /27002 – Security oriented controls – Focused on security • TIA 942 (Telecommunications Industry Association) – Data center fault tolerant controls – Focused on resilience 26
  • 27. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE PII BREACH BY CLOUD PROVIDER • Could subject them to violations under the following privacy laws: – Privacy and safeguard rules under GLBA – PCI-DSS data transmission and storage security provisions – HIPAA restrictions on sharing health care data – Breach provisions under the HITECH Act • Depends on provider’s contract provisions • You can’t outsource your accountability for information security 27
  • 28. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE ASSURANCE FRAMEWORKS • Cloud Security Alliance (CSA) – Cloud Controls Matrix – https://cloudsecurityalliance.org • Information Systems Audit and Control Association (ISACA) – Cloud Computing Management Audit/Assurance Program – http://www.isaca.org/Knowledge- Center/Research/ResearchDeliverables/Pages/Cloud- Computing-Management-Audit-Assurance-Program.aspx • European Network and Information Security Agency (ENISA) – Cloud Computing Security Risk Assessment – http://www.enisa.europa.eu/activities/risk- management/files/deliverables/cloud-computing-risk-assessment 28
  • 29. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE CLOUD SECURITY ALLIANCE • GRC “Stack” – Cloud Controls Matrix – Consensus Assessments Initiative – Cloud Audit – Cloud Trust Protocol – Designed to support both cloud consumers and cloud providers – Created to capture value from the cloud as well as support compliance and control within the cloud © 2011 Cloud Security Alliance, Inc. All rights reserved 29
  • 30. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE GRC STACK • Cloud Controls Matrix – Fundamental security principles in specifying the overall security needs of a cloud consumer and assessing the overall security risk of a cloud provider – What control requirements should I have as a cloud consumer or cloud provider? • Consensus Assessments Initiative – Industry-accepted ways to document what security controls exist – How do I ask about the control requirements that are satisfied (consumer) or express my claim of control response (provider)? © 2011 Cloud Security Alliance, Inc. All rights reserved 30
  • 31. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE GRC STACK • Cloud Audit – Common interface and namespace to automate the Audit, Assertion, Assessment, and Assurance of cloud environments – How do I announce and automate my claims of audit support for all of the various compliance mandates and control obligations? • Cloud Trust Protocol – Common technique and nomenclature to request and receive evidence and affirmation of current cloud service operating circumstances from cloud provider – How do I know that the controls I need are working for me (consumer)? How do I provide actual security and transparency of service to all of my cloud users (provider)? © 2011 Cloud Security Alliance, Inc. All rights reserved 31
  • 32. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE CLOUD CONTROLS MATRIX Controls base-lined and mapped to: – BITS Shared Assessments – COBIT – FedRAMP – HIPAA/HITECH Act – ISO/IEC 27001-2005 – Jericho Forum – NERC CIP – NIST SP800-53 – PCI DSSv2.0 © 2011 Cloud Security Alliance, Inc. All rights reserved 32
  • 33. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE CLOUD CONTROL MATRIX - DOMAINS 1. Compliance (CO) 7. Operations Management (OM) 2. Data Governance (DG) 8. Risk Management (RI) 3. Facility Security (FS) 9. Release Management (RM) 4. Human Resources (HR) 10. Resiliency (RS) 5. Information Security (IS) 11. Security Architecture (SA) 6. Legal (LG) © 2011 Cloud Security Alliance, Inc. All rights reserved 33
  • 34. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE CCM - CONTROLS © 2011 Cloud Security Alliance, Inc. All rights reserved 34
  • 35. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE CCM – CONTROLS (CONT.) © 2011 Cloud Security Alliance, Inc. All rights reserved 35
  • 36. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE CCM – CONTROLS (CONT.) © 2011 Cloud Security Alliance, Inc. All rights reserved 36
  • 37. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE CCM – CONTROLS (CONT.) © 2011 Cloud Security Alliance, Inc. All rights reserved 37
  • 38. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE CLOUD CONTROL MATRIX - SAMPLE 38 © 2011 Cloud Security Alliance, Inc. All rights reserved
  • 39. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE WHAT DO YOU DO WITH A COMPLETED CCM? • Consumer: As an internal assessment tool – Log exceptions and draft a report of provider’s level of control maturity or a gap analysis • Provider: As a public assertion of control maturity – CSA STAR (Security, Trust and Assurance Registry) – Trusted Cloud Initiative • www.cloudsecurityalliance.org/trustedcloud.html © 2011 Cloud Security Alliance, Inc. All rights reserved 39
  • 40. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE POLLING QUESTION • Regarding the Cloud Security Alliance Cloud Control Matrix: – A. I am familiar with the CSA and CCM and have used the framework to assess cloud service providers. – B. I am familiar with the framework but have yet to use it. – C. I have not previously heard of the framework but think it might be useful. – D. I don’t think this framework is applicable to my company’s assessment of cloud service providers. 40
  • 41. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE INTEGRATION TRENDS / CONCERNS • “Bring Your Own Device” (BYOD) – Smartphone, tablet, laptop • “Bring Your Own Cloud” (BYOC) – Google Docs, Dropbox, iCloud, Skydrive 41
  • 42. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE “DATA AWARE” SECURITY • Information Security trend • Knowing if a particular combination of user, device, and software can be trusted with access to specific information • Challenge: Encoding this security intelligence into your data before you store it in the public cloud 42
  • 43. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE RECAP • Cloud computing has tangible benefits and could be a strategic differentiator • Your organization may be more actively deployed to the “cloud” than you realize • New risks are introduced, but can be managed with assurance frameworks 43
  • 44. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE QUESTIONS? • George.Thomas@firstdata.com • Brian.Dickard@firstdata.com 44
  • 45. CLOUD COMPUTING RISK MANAGEMENT: SECURITY CONSIDERATIONS FROM AN ASSURANCE PERSPECTIVE REFERENCES • Cloud Security Alliance – Security Guidance For Critical Areas of Focus in Cloud Computing V3.0 (2011) • https://cloudsecurityalliance.org/research/security- guidance/ – Cloud Security Alliance GRC Stack (2011) • https://cloudsecurityalliance.org/research/grc-stack/ – Cloud Security Alliance Cloud Controls Matrix V1.1 (2010) • https://cloudsecurityalliance.org/research/ccm/ • Information Week (Jan-Mar 2012) • MIT Technology Review (Jan-Mar 2012) 45