SlideShare une entreprise Scribd logo
1  sur  57
Securing Your Enterprise; Protecting Your Brand
Securing Apps & Data in the Cloud
Executive Breakfast | Toronto Board of Trade
.
Securing Apps and Data in the Cloud
Presented By: Lisa Abe-Oldenburg
Toronto Board of Trade
July 23, 2014
Introduction
• Overview of Cloud Computing
• Issues and Risks
• Risk Mitigation Strategies
• Responding to Data Breaches
• Organizational Data and App Practices
• Summary of Best Practices and Tips
Overview of Cloud Computing
• "Cloud computing is a model for enabling convenient, on-demand network
access to a shared pool of configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can be rapidly provisioned
and released with minimal management effort or service provider interaction.
This cloud model promotes availability and is composed of five essential
characteristics, three service models, and four deployment models." - National
Institute of Standards and Technology (NIST) v. 15
• Rearden LLC v. Rearden Commerce, Inc., 597 F.Supp. 2d 1006 (N.D. Cal.
Jan. 27, 2009) – “Cloud Computing” defined as a software as a service
platform for the online delivery of products and services
• “Surge computing” analogous to electricity providers, where players intra
cloud (or in cloud stacks) or inter-cloud, are essentially trading processing and
storage capacity. Data, software and servers are able to be moved
instantaneously to available computation resources
Cloud Computing Essential Characteristics
• On-demand self-service. A consumer can unilaterally provision
computing capabilities, such as applications, server time and
network storage, as needed automatically without requiring human
interaction with each service’s provider.
• Rapid elasticity. Capabilities can be rapidly and elastically
provisioned, in some cases automatically, to quickly scale out and
rapidly released to quickly scale in. To the consumer, the
capabilities available for provisioning often appear to be unlimited
and can be purchased in any quantity at any time.
• Broad network access. Capabilities are available over the
network and accessed through standard mechanisms that promote
use by heterogeneous thin or thick client platforms (e.g., mobile
phones, laptops, and PDAs).
Cloud Computing Essential Characteristics
• Resource pooling. The provider’s computing resources are
pooled to serve multiple consumers using a multi-tenant model,
with different physical and virtual resources dynamically assigned
and reassigned according to consumer demand. There is a sense of
location independence in that the customer generally has no
control or knowledge over the exact location of the provided
resources but may be able to specify location at a higher level of
abstraction (e.g., country, state, or datacenter). Examples of
resources include storage, processing, memory, network
bandwidth, and virtual machines.
Cloud Computing Essential Characteristics
• Measured Service. Cloud systems automatically control and
optimize resource use by leveraging a metering capability at some
level of abstraction appropriate to the type of service (e.g., storage,
processing, bandwidth, and active user accounts). Resource usage
can be monitored, controlled, and reported providing transparency
for both the provider and consumer of the utilized service.
Cloud Computing Benefits
• Opportunity to purchase a broad range of IT services in a utility- based
model
• Refocus efforts on IT operational expenditures and only pay for IT
services consumed instead of buying IT with a focus on capacity
• Storage, provisioning and management of apps, data and other
personal information in a cloud computing model or SaaS model, can
help companies increase operational efficiencies, resource utilization,
and innovation, delivering a higher return on our investments to
stakeholders
• Simpler issuance of cloud based apps
• Consumer device capabilities: Ubiquitous – Only requires data
connection
Deployment Models
• Private cloud. The cloud infrastructure is operated solely for an
organization. It may be managed by the organization or a third party and may
exist on premise or off premise.
• Community cloud. The cloud infrastructure is shared by several
organizations and supports a specific community that has shared concerns
(e.g., mission, security requirements, policy, and compliance considerations).
It may be managed by the organizations or a third party and may exist on
premise or off premise.
• Public cloud. The cloud infrastructure is made available to the general
public or a large industry group and is owned by an organization selling cloud
services.
• Hybrid cloud. The cloud infrastructure is a composition of two or more
clouds (private, community, or public) that remain unique entities but are
bound together by standardized or proprietary technology that enables data
and application portability (e.g., cloud bursting for load-balancing between
clouds).
Cloud Delivery/Service Models
• Software as a Service (SaaS)
• cloud provider supplies the software
• user can set limited configuration of the software
• Platform as a Service (PaaS)
• cloud provider supplies the programming language and tools
• user selects and controls applications and hosting environments
• Infrastructure as a Service (IaaS)
• cloud provider manages and controls underlying cloud infrastructure
• user selects and configures operating systems, storage, applications,
networking components (e.g. firewalls, load balancers)
• Cloud service integrators bundle multiple services into a single offering, to
appear as a seamless consolidated application
• E.g. customer relationship and reservations system, e-signature/e-
commerce app, payment processing, billing platform, etc.
Cloud Delivery/Service Models
Data /
Content
Software
Application
Platform
Computing Infrastructure
(processing, storage, networks)
Cloud Infrastructure
user
user
user
CLOUD
Cloud Stack
Issues and Risks in Cloud Computing
• Regulatory and Document/Data Retention Risk
• How will the cloud provider meet your
organization's regulatory compliance
requirements?
• Access and retrieval of software and data for the
purposes of audit, compliance,
litigation/eDiscovery, correction, deletion, end of
service/termination, breach/failure, disaster or
insolvency of cloud provider
• Risk of insufficient backups, disaster recovery and
business continuity plans – often obligations and
costs are pushed onto customer (i.e. your company)
• Watch out for freezing of accounts and no access to
data upon termination or breach – data could be
deleted (hijacked until fees paid or dispute
resolved)
Issues and Risks (cont.)
• Operational, compliance and legal risk
• IT dept loses control
• Where is the Cloud and which laws apply?
• Where is the data and apps? Cloud is flexible
and data (and software) can move easily
across borders if network is big enough -
moved around to where storage or processing
is more cost effective, efficient or available
• Your organization could be unwillingly
subjecting itself to the laws of a foreign
jurisdiction
• Contracts or services in foreign jurisdictions
could have conflicts with local laws, storage,
handling of disputes, export controls, etc.
Issues and Risks (cont.)
• Operational, compliance and legal risk
(cont.)
• CASL applies to not just electronic
communications, but also transmission data
and software
• CASL currently prohibits the alteration of
transmission data in an electronic message in
the course of a commercial activity, without
express consent, so that the message is
delivered to a destination other than, or in
addition to, that specified by the sender
Issues and Risks (cont.)
• Operational, compliance and legal risk
(cont.)
• CASL will also prohibit the installation of a
computer program on any other person’s
computer system, in the course of
commercial activity without express consent.
To aid, induce, procure or cause to be
procured any of the foregoing activities is also
prohibited.
• These software prohibitions will apply
effective January 15, 2015 to any computer
system or person (whether contravening or
directing) located in Canada at the relevant
time.
Issues and Risks (cont.)
• Business Operations, Liability and
Reputational Risks
• Risk of asset/data loss, security and privacy
breaches, inability to retrieve or use data,
failure to properly retain records
• No common cloud standards; PCI DSS,
EMV and ISO standards may provide some
security, reliability and interoperability
• Aggregation of vast amounts of personal
information is possible especially when
using mobile technologies
• Clouds are a target for criminals – lots of
information
Issues and Risks (cont.)
• IP ownership and infringement risk
• Loss of ownership and control over software
and data - how being used and by whom?
• Ownership complications if cloud used for
any development – need to examine
applicable jurisdiction's copyright law and
cloud service agreement
• Software or systems being migrated to the
cloud could also give rise to copyright
infringement or breach of 3rd
party licenses -
creation of virtual servers or applications
could be making a “copy” and require
additional license rights and payment of
fees to licensors/owners
Issues and Risks (cont.)
• Legal Contract and Liability risk
• Limits on provider's liability may be too low -
disclaimers, exclusions, short limitation
periods; risk of liability shifts to your
organization
• What is your recourse if provider is in breach?
If there is a service interruption/outage,
errors, damages, loss, data disclosure ?
• Cloud providers often will not give
indemnities and will ask for broad indemnities
from the customer – must renegotiate!
• Watch out for terms that could be unilaterally
amended by service provider, deemed
accepted by use, or cross-referenced in other
documents or hyperlinks – you need to know
in advance what your organization is agreeing
to
Risk Mitigation Strategies
• Compliance vs. Security
• Assess compliance requirements under applicable laws and regulations
• Preparation is key to prevention of data loss or breach
• Establish baselines for security, confidentiality, data integrity, access and
retention
• Keep core business and data in-house or encrypted – establish policies
• Incorporate e-discovery tools and information management processes
• Consult with all stakeholders and legal counsel
• Analysis of data collection, storage, use, disclosure, transfer
• Transparency of equipment, premises, personnel, processes
• Internal governance, employee policies for BYOC and training
• Plan for transitioning (e.g. end of term, sale of business,
subcontracting, affiliates) & knowledge transfer by employees
Risk Mitigation Strategies (cont.)
• Legal review of Contracts – existing and new
• Negotiate limitations on liability and disclaimers, warranties and indemnities,
parental/prime contractor guarantees, hold-backs, alternative dispute resolution,
performance bonds, insurance and other contract terms
• Must deal with changes to laws and regulations, technology and risk over time
• Need reporting, breach notification and assistance, monitoring, management
oversight, audit rights, control, record keeping and data return, change
process, confidentiality and privacy terms, security and encryption schemes,
testing, data segregation, export controls, maintenance, disaster and
continuity/recovery planning, data backup, early termination , etc.
• Have clear service & security level requirements that align with your
organizational requirements – scope and remedies?
• Thresholds of risk tolerance will affect negotiations
• What is the harm that could occur as a result of breach and which party is best able
to mitigate risk? Cost? Should indirect damages be allowed? Are caps on liability
enough?
• Don’t sign a standard form contract!
Responding to Data Breaches
• What are your legal obligations if there is a data breach?
• Note, this presentation only covers data breaches in the private sector
and not breaches with respect to public sector, health or employee
information.
• Under federal private sector privacy law, PIPEDA, breach
notification is currently voluntary - to notify individuals of
breaches involving their personal information, or to notify the
OPC
Responding to Data Breaches (cont.)
• The Canadian Data Breach Guidelines drafted in 2007 in
consultation with commissioners' offices, advocacy groups and
representatives from industry, encourage organizations to:
• Contain the breach and conduct a preliminary assessment of what
occurred;
• Evaluate the risks associated with the breach;
• Notify the parties affected by the breach;
• Take adequate steps to ensure that such an incident does not recur in
the future.
Responding to Data Breaches (cont.)
• The OPC encourages organizations to notify the office or
appropriate provincial privacy commissioners of “material”
breaches of security safeguards that involve personal
information—determining whether a breach is “material”
involves, among other considerations, assessing the sensitivity
of personal information and the number of individuals affected.
• PIPEDA does include requirements around adequately
safeguarding personal information through the use of
physical, technological and organizational measures.
• Absence of “appropriate” controls resulting in breaches
currently does not trigger any regulatory consequences, such as
fines or penalties.
Responding to Data Breaches (cont.)
• Proposed amendments to Canada's federal privacy legislation
(PIPEDA) under Bill S-4 (introduced in the Senate April 8,
2014) will require businesses and organizations to track data
breaches and report them to individuals and the OPC if it is
reasonable in the circumstances to believe that the breach
creates a real risk of significant harm, e.g. identity theft
• The Bill sets out factors to assess risk, requirements for the
content and timing of the notification and record keeping
requirements of all breaches
• May also be obligation to report to other organizations or
government if risk could be reduced
• Non-compliance would be punishable by fines of up to
$100,000
Responding to Data Breaches (cont.)
• The Bill also gives new powers to the privacy commissioner to:
• negotiate voluntary but binding compliance agreements with
organizations that commit to taking action on privacy violations;
• right to ask the Federal Court of Canada to order compliance or award
damages to someone harmed by a privacy violation up to a year after
an investigation; and
• release information about non-compliant organizations if it is in the
public interest.
Responding to Data Breaches (cont.)
• Alberta is only province which has enacted amendments to its
private sector Personal Information Protection Act (PIPA) to
address incidents involving the “loss of or unauthorized access to
or disclosure of the personal information.”
• Note that recent SCC decision (Alberta (Information and Privacy
Commissioner ) v. United Food and Commercial Workers, Local
401, 2013 SCC 62) struck down Alberta's PIPA in its entirety as
unconstitutional. This declaration of invalidity has been stayed for
12 months in order to provide enough time to legislators to decide
how to make this act constitutional – amendments planned for
this fall
• Other provinces, e.g. Ontario, New Brunswick and Newfoundland
and Labrador, only require breach notification with respect to
personal health information.
Responding to Data Breaches (cont.)
• Alberta PIPA requires notice to the province’s Privacy
Commissioner of loss of, or unauthorized access to, personal
information under the organizations' control - only if a
reasonable person would consider that there exists a real risk of
significant harm to an individual. Commissioner decides
whether individuals should be notified.
Responding to Data Breaches (cont.)
• “real risk of harm” must be more than merely speculative and
not simply hypothetical or theoretical. A breach relating to
highly sensitive personal information, such as financial
information, is more likely to meet this standard and require
reporting.
• The commissioner has interpreted “significant harm” to mean
“a material harm...[having] non-trivial consequences or effects.
Examples may include possible financial loss, identity theft,
physical harm, humiliation or damage to one’s professional or
personal reputation.”
Responding to Data Breaches (cont.)
• Manitoba's Personal Information Protection and Identity Theft
Prevention Act (PIPITPA) – private sector law not yet in force
• PIPITPA will generally require breach notification to an
individual directly if personal information is lost, accessed or
disclosed without authorization – no harm threshold
• In Québec, the Commission d'accès à l'information du Québec
("CAI") in its 2011 Quinquennial Report entitled "Technology
and Privacy, in a Time of Societal Choices" recommends to
include, in both its public sector and private sector data
protection laws, mandatory security breach reporting.
Responding to Data Breaches (cont.)
• PIPITPA will also create a private right of action for an
individual to sue an organization for damages arising from its
failure to:
• protect personal information that is in its custody or control; or
• provide reasonable notice if the organization was not satisfied that the
lost, stolen or accessed information would be used lawfully.
• Jurisdictions outside Canada may have extraterritorial
implications, e.g. California has its own breach notification law
Organizational Data and App Practices
• Designate privacy and technology officers to ensure
compliance under Canadian and foreign laws
• Consult with the regulators when in doubt about systems
and privacy policies
• Have a data breach protocol plan in place - how to notify,
who, and when? E.g. the regulators, individuals, ASAP
• Limit access to electronic records to a need-to-know basis
and password protect; control dissemination of apps
• Draft and keep records of proper consents prior to
collecting, using or disclosing any personal information or
providing apps
Organizational Data and App Practices (cont.)
• Identify purposes for the collection, use and disclosure, and
limit collection, use and disclosure to those purposes, which
must be reasonable
• Develop, implement and review privacy and security
policies, CASL policy (see new CRTC Bulletin 2014-326),
technology policy, including procurement, software, BYOD
and services policies
• Train employees and get acknowledgments
• Protect personal information and data from theft,
modification, and unauthorized access
Organizational Data and App Practices (cont.)
• Keep personal information only for as long as reasonable to
carry out the business or legal purpose or as required by law
and destroy or anonymize records once no longer needed
• Develop a procedure for information requests/access,
correction and deletion
• Review and revise all contracts with third parties to ensure
obligations flow through
• “Stress test” data and app operations - privacy and data
policies can be a marketing opportunity
• After a data breach occurs, comply with data breach
guidelines and notification requirements
• Offer credit monitoring to clients
Summary of Best Practices and Tips
• The legal implications of cloud computing, privacy, security,
confidentiality and data breaches involve many complex
issues
• Insist on provider transparency: participants/subcontractors,
jurisdictions, data flow and processing, type of cloud and who
has access
• Engage all organizational teams that may have input to the
cloud relationship, e.g. operational, procurement, contracts
negotiation, privacy, employment (HR), compliance, audit,
insurance, IT, security, risk, Board of Directors
• Directors' liability for breach of their duties in risk
management and oversight
• Have proper testing, plans and policies in place
• Get early involvement of experienced legal counsel
Lisa K. Abe- Oldenburg, B.Comm., J.D.
Abe-oldenburgL@bennettjones.com
Tel.: 416-777-7475
www.bennettjones.com
• This presentation
contains statements of
general
principles and not legal
opinions and should not
be acted upon without
first consulting a lawyer
who will provide
analysis and advice on a
specific
matter.
Newsflash: Shift to Cloud Beats the Street
IT spending forecast revised lower, amid shift to cloud and commodity
products. Global IT spending will grow 2.1% to $3.7 trillion this year, a weaker
performance than originally expected, although one that is still far stronger than
the marginal gain of 2013, according to research firm Gartner Inc. The
downward revision of more than one percentage point was attributed to product
commoditization, heightened competition, and the shift to the cloud. “Things are
starting to become commoditized faster than we expected,” Gartner analyst
John Lovelock tells CIO Journal. And as individual lines of business command
their own ever-growing technology budgets, spending on cloud-based
applications is drawing funds away from traditional IT departments, whose
spending power is “in trouble,”
Cloud App Explosion
39
Driven by individual and
line of business adoption
of cloud and mobile.
It’s how we do business.
2011 2016
$21.2B
$92.8B
4.4xgrowth
SaaSRevenue
Forrester
40
There are 5,000 enterprise apps
today (and growing).
41
Security & Risk
Compliance
Control
Business Benefits
Agility
Cost Savings
“To SaaS or not To SaaS….That is the Question!”
Perspectives
42
• Legal
– Bennett Jones, LLP
• Corporate IT (CIO/CSO)
– Sony
• IT Sector: Cloud Access Security Broker
– Netskope
Highlights
43
• Business users are adopting consumer behaviors
• Everything about data is changing
• Consumerization is shifting IT architectures
• Security risks arise with new architectures
• A prescription for better security!
Business users are adopting consumer
behaviors
44
• Today’s Business Users
– Do not ask if they can use new applications. They just install them.
– Choose where they store data
– Bring consumer attitudes to work…and expect IT to adapt!
– Want to comply with security and compliance rules ..but want freedom
to make decision on apps, data, and devices
• Implication for IT: IT has no choice but to adapt, manage and control
Everything about DATA is changing
45
Big Data Cloud Mobile
46
Why would you
invest in
Data
Security ?
Major SHIFT in enterprise architecture
47
Change your Security Strategy!
Discover - Monitor - Control
48
Source: Netskope Data
Security risks associated with a new
architecture
49
• Network perimeter has blurred…or doesn’t exist
• Multiple copies of data…only contractual based
control with 3rd party
• Access control…..no tools
• If they get hacked, your data security is
compromised
– How do you disconnect from your responsibility?
• IT will not have view into mobile apps transactions
• Low standards to evaluate security of mobile apps
• Security skills shortage
A prescription for better security
50
• Create a security policy for Cloud
– Include Apps, Data, Access Control
• Do a skill set inventory
– what you have and what you will need?
• Build a future security architecture… it will not be perfect
– How are you going to measure and manage?
• Redefine your risk management process
– Identify your assets…… you do not know.
• Assess data security
– Prepare to manage the security of data that is not in your control
51
52
Actual:
461
IT estimate:
40-50 76% cloud apps aren’t
enterprise-ready
Cloud procurement
happens outside of IT
Challenge:
Get visibility and empower
safe cloud usage
App redundancy:
•41 HR
•27 storage
•27 finance
Source: Netskope Data
53
#1 Technology for Information Security in 2014
Analysts Examine Industry Trends at Gartner Security & Risk Management
Summit, June 23-26, National Harbor, MD
Cloud Access Security Brokers
Cloud access security brokers are on-premises or cloud-based security policy enforcement
points placed between cloud services consumers and cloud services providers to interject
enterprise security policies as the cloud-based resources are accessed. In many cases,
initial adoption of cloud-based services has occurred outside the control of IT, and cloud
access security brokers offer enterprises to gain visibility and control as its users access
cloud resources.
54
“Cool Vendors offer innovative,
forward-thinking solution sets designed
to address emerging and newly
identified security challenges.”
Mitigate Business Risk
55
Take Control of
Cloud Apps
Take Control of
Cloud Apps
Take Control of
User Activities
Take Control of
User Activities
Take Control of
Data
Take Control of
Data
Take Control of
Compliance
Take Control of
Compliance
1. Understand the Cloud Apps usage,
category, business function and Risk
Assessment
2. Baseline sanctioned, departmental
and individual cloud apps
3. Understand the high-level of data
movement to/from the clouds
4. Coach & Establish Acceptable Use
Policies (AUP) for cloud apps across
business, departments and users
5. Understand the risky activity usage
such as share, upload, download &
administration across cloud apps
6. Understand the activities related
to data movement across geo-
locations between users and cloud
apps
7. Monitor for Cloud App Usage
Anomalies and Irregularities
8. Coach and establish Acceptable
Use Policies (AUP) for Cloud App
activities, users, devices, geo-
locations and time
9. Audit and alert on sensitive data
existing in & moving across cloud apps
•PII, PCI, PHI, Intellectual Property
10. Coach, Alert and Block Sensitive
Data uploads and shares
11. Encrypt data in the cloud for data-
at-rest and use protection
12. Establish Acceptable Use Policy &
Protection (AUP) for your corporate
data based on app, content
classification, app, department, user
and geo-location
15% 40% 75% 90+%
13. Employ data audit & forensics
14. Records retention and retrieval
15. E-discovery compliance
16. PCI, PHIPA industry specific
compliance
17. Business Compliance
CASL, SOX, GLBA, ..
18. FINRA advanced regulation with
ethical walls
Provision-by-Purpose
• Best User Experience, Security & Performance
• Easy to deploy and Quick to value
56
Netskope: Comprehensive Cloud Security Platform
Any App Any Device
Anywhere
DISCOVERY ANALYTICS ENFORCEMENT
AppID
Cloud App, Category, CCI
AppID
Cloud App, Category, CCI
ActivityID
Share, Upload, Download, Admin
ActivityID
Share, Upload, Download, Admin
DataID
PII, PCI, PHI, IP, …
DataID
PII, PCI, PHI, IP, …
ActorID
User, Device, Geo, Time, …
ActorID
User, Device, Geo, Time, …
Deep
Context
Rich Enablement Services
Sanctioned Business Apps
Unsanctioned Apps
Consumer Apps
DLP, ENCRYPTION
Securing Apps & Data in the Cloud Executive Breakfast

Contenu connexe

Tendances

Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...rajender147
 
Week 3 lecture material cc
Week 3 lecture material ccWeek 3 lecture material cc
Week 3 lecture material ccAnkit Gupta
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
Week 1 lecture material cc
Week 1 lecture material ccWeek 1 lecture material cc
Week 1 lecture material ccAnkit Gupta
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computingPuneet Arora
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Brian K. Dickard
 
IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Cloud and challenges isacakenya
Cloud and challenges   isacakenyaCloud and challenges   isacakenya
Cloud and challenges isacakenyaTonny Omwansa
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMHector Del Castillo, CPM, CPMM
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)ClubHack
 

Tendances (18)

Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...
 
Week 3 lecture material cc
Week 3 lecture material ccWeek 3 lecture material cc
Week 3 lecture material cc
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Week 1 lecture material cc
Week 1 lecture material ccWeek 1 lecture material cc
Week 1 lecture material cc
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
 
106248842 cc
106248842 cc106248842 cc
106248842 cc
 
IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED-V1I1P1
IJSRED-V1I1P1
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud and challenges isacakenya
Cloud and challenges   isacakenyaCloud and challenges   isacakenya
Cloud and challenges isacakenya
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
 

Similaire à Securing Apps & Data in the Cloud Executive Breakfast

Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and factsArun Ganesh
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxsarahabbas40
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basicsRahul Gurnani
 
Cloud computing explained
Cloud computing explained Cloud computing explained
Cloud computing explained Juan Pablo
 
Chap 1 introduction to cloud computing
Chap 1 introduction to cloud computingChap 1 introduction to cloud computing
Chap 1 introduction to cloud computingRaj Sarode
 
A cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computingA cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computingShahzad
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
 
The Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research PaperThe Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research PaperFaimin Khan
 
Introduction to Cloud Computing, Overview
Introduction to Cloud Computing, OverviewIntroduction to Cloud Computing, Overview
Introduction to Cloud Computing, OverviewSudiptaDas684406
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1charan7575
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxMuhammadArslan799356
 
cloud computing.ppt
cloud computing.pptcloud computing.ppt
cloud computing.pptMunmunSaha7
 
NARA's FAQ and Bulletin on Cloud Computing
NARA's FAQ and Bulletin on Cloud ComputingNARA's FAQ and Bulletin on Cloud Computing
NARA's FAQ and Bulletin on Cloud ComputingArian Ravanbakhsh
 
Cloud computing
Cloud computingCloud computing
Cloud computingArar Fahem
 

Similaire à Securing Apps & Data in the Cloud Executive Breakfast (20)

Mining IT Summit Nov 6 2014
Mining IT Summit Nov 6 2014Mining IT Summit Nov 6 2014
Mining IT Summit Nov 6 2014
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and facts
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing explained
Cloud computing explained Cloud computing explained
Cloud computing explained
 
The cloud ecosystem
The cloud ecosystemThe cloud ecosystem
The cloud ecosystem
 
Chap 1 introduction to cloud computing
Chap 1 introduction to cloud computingChap 1 introduction to cloud computing
Chap 1 introduction to cloud computing
 
A cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computingA cross referenced whitepaper on cloud computing
A cross referenced whitepaper on cloud computing
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
What Is Cloud Computing?
What Is Cloud Computing?What Is Cloud Computing?
What Is Cloud Computing?
 
The Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research PaperThe Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research Paper
 
Introduction to Cloud Computing, Overview
Introduction to Cloud Computing, OverviewIntroduction to Cloud Computing, Overview
Introduction to Cloud Computing, Overview
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptx
 
cloud computing.ppt
cloud computing.pptcloud computing.ppt
cloud computing.ppt
 
NARA's FAQ and Bulletin on Cloud Computing
NARA's FAQ and Bulletin on Cloud ComputingNARA's FAQ and Bulletin on Cloud Computing
NARA's FAQ and Bulletin on Cloud Computing
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cs6703 grid and cloud computing unit 3
Cs6703 grid and cloud computing unit 3Cs6703 grid and cloud computing unit 3
Cs6703 grid and cloud computing unit 3
 

Dernier

Bare And Wild Creation, Curio Shop, Tucumcari NM
Bare And Wild Creation, Curio Shop, Tucumcari NMBare And Wild Creation, Curio Shop, Tucumcari NM
Bare And Wild Creation, Curio Shop, Tucumcari NMroute66connected
 
MinSheng Gaofeng Estate commercial storyboard
MinSheng Gaofeng Estate commercial storyboardMinSheng Gaofeng Estate commercial storyboard
MinSheng Gaofeng Estate commercial storyboardjessica288382
 
Roadrunner Lodge, Motel/Residence, Tucumcari NM
Roadrunner Lodge, Motel/Residence, Tucumcari NMRoadrunner Lodge, Motel/Residence, Tucumcari NM
Roadrunner Lodge, Motel/Residence, Tucumcari NMroute66connected
 
Russian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts ServiceRussian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts Servicedoor45step
 
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Service
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts ServiceIndian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Service
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Servicedoor45step
 
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?kexey39068
 
FULL ENJOY - 9953040155 Call Girls in Dwarka Mor | Delhi
FULL ENJOY - 9953040155 Call Girls in Dwarka Mor | DelhiFULL ENJOY - 9953040155 Call Girls in Dwarka Mor | Delhi
FULL ENJOY - 9953040155 Call Girls in Dwarka Mor | DelhiMalviyaNagarCallGirl
 
FULL ENJOY - 9953040155 Call Girls in Karol Bagh | Delhi
FULL ENJOY - 9953040155 Call Girls in Karol Bagh | DelhiFULL ENJOY - 9953040155 Call Girls in Karol Bagh | Delhi
FULL ENJOY - 9953040155 Call Girls in Karol Bagh | DelhiMalviyaNagarCallGirl
 
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 60009654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000Sapana Sha
 
FULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | DelhiFULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | DelhiMalviyaNagarCallGirl
 
Greater Noida Call Girls : ☎ 8527673949, Low rate Call Girls
Greater Noida Call Girls : ☎ 8527673949, Low rate Call GirlsGreater Noida Call Girls : ☎ 8527673949, Low rate Call Girls
Greater Noida Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
Downtown Call Girls O5O91O128O Pakistani Call Girls in Downtown
Downtown Call Girls O5O91O128O Pakistani Call Girls in DowntownDowntown Call Girls O5O91O128O Pakistani Call Girls in Downtown
Downtown Call Girls O5O91O128O Pakistani Call Girls in Downtowndajasot375
 
Russian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts ServiceRussian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts Servicedoor45step
 
Faridabad Call Girls : ☎ 8527673949, Low rate Call Girls
Faridabad Call Girls : ☎ 8527673949, Low rate Call GirlsFaridabad Call Girls : ☎ 8527673949, Low rate Call Girls
Faridabad Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
Olivia Cox. intertextual references.pptx
Olivia Cox. intertextual references.pptxOlivia Cox. intertextual references.pptx
Olivia Cox. intertextual references.pptxLauraFagan6
 
Mandi House Call Girls : ☎ 8527673949, Low rate Call Girls
Mandi House Call Girls : ☎ 8527673949, Low rate Call GirlsMandi House Call Girls : ☎ 8527673949, Low rate Call Girls
Mandi House Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
Khanpur Call Girls : ☎ 8527673949, Low rate Call Girls
Khanpur Call Girls : ☎ 8527673949, Low rate Call GirlsKhanpur Call Girls : ☎ 8527673949, Low rate Call Girls
Khanpur Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi Ncr
9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi Ncr9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi Ncr
9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi NcrSapana Sha
 
San Jon Motel, Motel/Residence, San Jon NM
San Jon Motel, Motel/Residence, San Jon NMSan Jon Motel, Motel/Residence, San Jon NM
San Jon Motel, Motel/Residence, San Jon NMroute66connected
 

Dernier (20)

Bare And Wild Creation, Curio Shop, Tucumcari NM
Bare And Wild Creation, Curio Shop, Tucumcari NMBare And Wild Creation, Curio Shop, Tucumcari NM
Bare And Wild Creation, Curio Shop, Tucumcari NM
 
MinSheng Gaofeng Estate commercial storyboard
MinSheng Gaofeng Estate commercial storyboardMinSheng Gaofeng Estate commercial storyboard
MinSheng Gaofeng Estate commercial storyboard
 
Roadrunner Lodge, Motel/Residence, Tucumcari NM
Roadrunner Lodge, Motel/Residence, Tucumcari NMRoadrunner Lodge, Motel/Residence, Tucumcari NM
Roadrunner Lodge, Motel/Residence, Tucumcari NM
 
Russian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts ServiceRussian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 104 Noida✨8375860717⚡Escorts Service
 
Call~Girl in Rajendra Nagar New Delhi 8448380779 Full Enjoy Escort Service
Call~Girl in Rajendra Nagar New Delhi 8448380779 Full Enjoy Escort ServiceCall~Girl in Rajendra Nagar New Delhi 8448380779 Full Enjoy Escort Service
Call~Girl in Rajendra Nagar New Delhi 8448380779 Full Enjoy Escort Service
 
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Service
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts ServiceIndian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Service
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Service
 
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?
 
FULL ENJOY - 9953040155 Call Girls in Dwarka Mor | Delhi
FULL ENJOY - 9953040155 Call Girls in Dwarka Mor | DelhiFULL ENJOY - 9953040155 Call Girls in Dwarka Mor | Delhi
FULL ENJOY - 9953040155 Call Girls in Dwarka Mor | Delhi
 
FULL ENJOY - 9953040155 Call Girls in Karol Bagh | Delhi
FULL ENJOY - 9953040155 Call Girls in Karol Bagh | DelhiFULL ENJOY - 9953040155 Call Girls in Karol Bagh | Delhi
FULL ENJOY - 9953040155 Call Girls in Karol Bagh | Delhi
 
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 60009654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
 
FULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | DelhiFULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | Delhi
 
Greater Noida Call Girls : ☎ 8527673949, Low rate Call Girls
Greater Noida Call Girls : ☎ 8527673949, Low rate Call GirlsGreater Noida Call Girls : ☎ 8527673949, Low rate Call Girls
Greater Noida Call Girls : ☎ 8527673949, Low rate Call Girls
 
Downtown Call Girls O5O91O128O Pakistani Call Girls in Downtown
Downtown Call Girls O5O91O128O Pakistani Call Girls in DowntownDowntown Call Girls O5O91O128O Pakistani Call Girls in Downtown
Downtown Call Girls O5O91O128O Pakistani Call Girls in Downtown
 
Russian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts ServiceRussian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts Service
Russian⚡ Call Girls In Sector 39 Noida✨8375860717⚡Escorts Service
 
Faridabad Call Girls : ☎ 8527673949, Low rate Call Girls
Faridabad Call Girls : ☎ 8527673949, Low rate Call GirlsFaridabad Call Girls : ☎ 8527673949, Low rate Call Girls
Faridabad Call Girls : ☎ 8527673949, Low rate Call Girls
 
Olivia Cox. intertextual references.pptx
Olivia Cox. intertextual references.pptxOlivia Cox. intertextual references.pptx
Olivia Cox. intertextual references.pptx
 
Mandi House Call Girls : ☎ 8527673949, Low rate Call Girls
Mandi House Call Girls : ☎ 8527673949, Low rate Call GirlsMandi House Call Girls : ☎ 8527673949, Low rate Call Girls
Mandi House Call Girls : ☎ 8527673949, Low rate Call Girls
 
Khanpur Call Girls : ☎ 8527673949, Low rate Call Girls
Khanpur Call Girls : ☎ 8527673949, Low rate Call GirlsKhanpur Call Girls : ☎ 8527673949, Low rate Call Girls
Khanpur Call Girls : ☎ 8527673949, Low rate Call Girls
 
9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi Ncr
9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi Ncr9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi Ncr
9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi Ncr
 
San Jon Motel, Motel/Residence, San Jon NM
San Jon Motel, Motel/Residence, San Jon NMSan Jon Motel, Motel/Residence, San Jon NM
San Jon Motel, Motel/Residence, San Jon NM
 

Securing Apps & Data in the Cloud Executive Breakfast

  • 1. Securing Your Enterprise; Protecting Your Brand Securing Apps & Data in the Cloud Executive Breakfast | Toronto Board of Trade .
  • 2.
  • 3. Securing Apps and Data in the Cloud Presented By: Lisa Abe-Oldenburg Toronto Board of Trade July 23, 2014
  • 4. Introduction • Overview of Cloud Computing • Issues and Risks • Risk Mitigation Strategies • Responding to Data Breaches • Organizational Data and App Practices • Summary of Best Practices and Tips
  • 5. Overview of Cloud Computing • "Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models." - National Institute of Standards and Technology (NIST) v. 15 • Rearden LLC v. Rearden Commerce, Inc., 597 F.Supp. 2d 1006 (N.D. Cal. Jan. 27, 2009) – “Cloud Computing” defined as a software as a service platform for the online delivery of products and services • “Surge computing” analogous to electricity providers, where players intra cloud (or in cloud stacks) or inter-cloud, are essentially trading processing and storage capacity. Data, software and servers are able to be moved instantaneously to available computation resources
  • 6. Cloud Computing Essential Characteristics • On-demand self-service. A consumer can unilaterally provision computing capabilities, such as applications, server time and network storage, as needed automatically without requiring human interaction with each service’s provider. • Rapid elasticity. Capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time. • Broad network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs).
  • 7. Cloud Computing Essential Characteristics • Resource pooling. The provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Examples of resources include storage, processing, memory, network bandwidth, and virtual machines.
  • 8. Cloud Computing Essential Characteristics • Measured Service. Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported providing transparency for both the provider and consumer of the utilized service.
  • 9. Cloud Computing Benefits • Opportunity to purchase a broad range of IT services in a utility- based model • Refocus efforts on IT operational expenditures and only pay for IT services consumed instead of buying IT with a focus on capacity • Storage, provisioning and management of apps, data and other personal information in a cloud computing model or SaaS model, can help companies increase operational efficiencies, resource utilization, and innovation, delivering a higher return on our investments to stakeholders • Simpler issuance of cloud based apps • Consumer device capabilities: Ubiquitous – Only requires data connection
  • 10. Deployment Models • Private cloud. The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise. • Community cloud. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on premise or off premise. • Public cloud. The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. • Hybrid cloud. The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds).
  • 11. Cloud Delivery/Service Models • Software as a Service (SaaS) • cloud provider supplies the software • user can set limited configuration of the software • Platform as a Service (PaaS) • cloud provider supplies the programming language and tools • user selects and controls applications and hosting environments • Infrastructure as a Service (IaaS) • cloud provider manages and controls underlying cloud infrastructure • user selects and configures operating systems, storage, applications, networking components (e.g. firewalls, load balancers) • Cloud service integrators bundle multiple services into a single offering, to appear as a seamless consolidated application • E.g. customer relationship and reservations system, e-signature/e- commerce app, payment processing, billing platform, etc.
  • 12. Cloud Delivery/Service Models Data / Content Software Application Platform Computing Infrastructure (processing, storage, networks) Cloud Infrastructure user user user CLOUD Cloud Stack
  • 13. Issues and Risks in Cloud Computing • Regulatory and Document/Data Retention Risk • How will the cloud provider meet your organization's regulatory compliance requirements? • Access and retrieval of software and data for the purposes of audit, compliance, litigation/eDiscovery, correction, deletion, end of service/termination, breach/failure, disaster or insolvency of cloud provider • Risk of insufficient backups, disaster recovery and business continuity plans – often obligations and costs are pushed onto customer (i.e. your company) • Watch out for freezing of accounts and no access to data upon termination or breach – data could be deleted (hijacked until fees paid or dispute resolved)
  • 14. Issues and Risks (cont.) • Operational, compliance and legal risk • IT dept loses control • Where is the Cloud and which laws apply? • Where is the data and apps? Cloud is flexible and data (and software) can move easily across borders if network is big enough - moved around to where storage or processing is more cost effective, efficient or available • Your organization could be unwillingly subjecting itself to the laws of a foreign jurisdiction • Contracts or services in foreign jurisdictions could have conflicts with local laws, storage, handling of disputes, export controls, etc.
  • 15. Issues and Risks (cont.) • Operational, compliance and legal risk (cont.) • CASL applies to not just electronic communications, but also transmission data and software • CASL currently prohibits the alteration of transmission data in an electronic message in the course of a commercial activity, without express consent, so that the message is delivered to a destination other than, or in addition to, that specified by the sender
  • 16. Issues and Risks (cont.) • Operational, compliance and legal risk (cont.) • CASL will also prohibit the installation of a computer program on any other person’s computer system, in the course of commercial activity without express consent. To aid, induce, procure or cause to be procured any of the foregoing activities is also prohibited. • These software prohibitions will apply effective January 15, 2015 to any computer system or person (whether contravening or directing) located in Canada at the relevant time.
  • 17. Issues and Risks (cont.) • Business Operations, Liability and Reputational Risks • Risk of asset/data loss, security and privacy breaches, inability to retrieve or use data, failure to properly retain records • No common cloud standards; PCI DSS, EMV and ISO standards may provide some security, reliability and interoperability • Aggregation of vast amounts of personal information is possible especially when using mobile technologies • Clouds are a target for criminals – lots of information
  • 18. Issues and Risks (cont.) • IP ownership and infringement risk • Loss of ownership and control over software and data - how being used and by whom? • Ownership complications if cloud used for any development – need to examine applicable jurisdiction's copyright law and cloud service agreement • Software or systems being migrated to the cloud could also give rise to copyright infringement or breach of 3rd party licenses - creation of virtual servers or applications could be making a “copy” and require additional license rights and payment of fees to licensors/owners
  • 19. Issues and Risks (cont.) • Legal Contract and Liability risk • Limits on provider's liability may be too low - disclaimers, exclusions, short limitation periods; risk of liability shifts to your organization • What is your recourse if provider is in breach? If there is a service interruption/outage, errors, damages, loss, data disclosure ? • Cloud providers often will not give indemnities and will ask for broad indemnities from the customer – must renegotiate! • Watch out for terms that could be unilaterally amended by service provider, deemed accepted by use, or cross-referenced in other documents or hyperlinks – you need to know in advance what your organization is agreeing to
  • 20. Risk Mitigation Strategies • Compliance vs. Security • Assess compliance requirements under applicable laws and regulations • Preparation is key to prevention of data loss or breach • Establish baselines for security, confidentiality, data integrity, access and retention • Keep core business and data in-house or encrypted – establish policies • Incorporate e-discovery tools and information management processes • Consult with all stakeholders and legal counsel • Analysis of data collection, storage, use, disclosure, transfer • Transparency of equipment, premises, personnel, processes • Internal governance, employee policies for BYOC and training • Plan for transitioning (e.g. end of term, sale of business, subcontracting, affiliates) & knowledge transfer by employees
  • 21. Risk Mitigation Strategies (cont.) • Legal review of Contracts – existing and new • Negotiate limitations on liability and disclaimers, warranties and indemnities, parental/prime contractor guarantees, hold-backs, alternative dispute resolution, performance bonds, insurance and other contract terms • Must deal with changes to laws and regulations, technology and risk over time • Need reporting, breach notification and assistance, monitoring, management oversight, audit rights, control, record keeping and data return, change process, confidentiality and privacy terms, security and encryption schemes, testing, data segregation, export controls, maintenance, disaster and continuity/recovery planning, data backup, early termination , etc. • Have clear service & security level requirements that align with your organizational requirements – scope and remedies? • Thresholds of risk tolerance will affect negotiations • What is the harm that could occur as a result of breach and which party is best able to mitigate risk? Cost? Should indirect damages be allowed? Are caps on liability enough? • Don’t sign a standard form contract!
  • 22. Responding to Data Breaches • What are your legal obligations if there is a data breach? • Note, this presentation only covers data breaches in the private sector and not breaches with respect to public sector, health or employee information. • Under federal private sector privacy law, PIPEDA, breach notification is currently voluntary - to notify individuals of breaches involving their personal information, or to notify the OPC
  • 23. Responding to Data Breaches (cont.) • The Canadian Data Breach Guidelines drafted in 2007 in consultation with commissioners' offices, advocacy groups and representatives from industry, encourage organizations to: • Contain the breach and conduct a preliminary assessment of what occurred; • Evaluate the risks associated with the breach; • Notify the parties affected by the breach; • Take adequate steps to ensure that such an incident does not recur in the future.
  • 24. Responding to Data Breaches (cont.) • The OPC encourages organizations to notify the office or appropriate provincial privacy commissioners of “material” breaches of security safeguards that involve personal information—determining whether a breach is “material” involves, among other considerations, assessing the sensitivity of personal information and the number of individuals affected. • PIPEDA does include requirements around adequately safeguarding personal information through the use of physical, technological and organizational measures. • Absence of “appropriate” controls resulting in breaches currently does not trigger any regulatory consequences, such as fines or penalties.
  • 25. Responding to Data Breaches (cont.) • Proposed amendments to Canada's federal privacy legislation (PIPEDA) under Bill S-4 (introduced in the Senate April 8, 2014) will require businesses and organizations to track data breaches and report them to individuals and the OPC if it is reasonable in the circumstances to believe that the breach creates a real risk of significant harm, e.g. identity theft • The Bill sets out factors to assess risk, requirements for the content and timing of the notification and record keeping requirements of all breaches • May also be obligation to report to other organizations or government if risk could be reduced • Non-compliance would be punishable by fines of up to $100,000
  • 26. Responding to Data Breaches (cont.) • The Bill also gives new powers to the privacy commissioner to: • negotiate voluntary but binding compliance agreements with organizations that commit to taking action on privacy violations; • right to ask the Federal Court of Canada to order compliance or award damages to someone harmed by a privacy violation up to a year after an investigation; and • release information about non-compliant organizations if it is in the public interest.
  • 27. Responding to Data Breaches (cont.) • Alberta is only province which has enacted amendments to its private sector Personal Information Protection Act (PIPA) to address incidents involving the “loss of or unauthorized access to or disclosure of the personal information.” • Note that recent SCC decision (Alberta (Information and Privacy Commissioner ) v. United Food and Commercial Workers, Local 401, 2013 SCC 62) struck down Alberta's PIPA in its entirety as unconstitutional. This declaration of invalidity has been stayed for 12 months in order to provide enough time to legislators to decide how to make this act constitutional – amendments planned for this fall • Other provinces, e.g. Ontario, New Brunswick and Newfoundland and Labrador, only require breach notification with respect to personal health information.
  • 28. Responding to Data Breaches (cont.) • Alberta PIPA requires notice to the province’s Privacy Commissioner of loss of, or unauthorized access to, personal information under the organizations' control - only if a reasonable person would consider that there exists a real risk of significant harm to an individual. Commissioner decides whether individuals should be notified.
  • 29. Responding to Data Breaches (cont.) • “real risk of harm” must be more than merely speculative and not simply hypothetical or theoretical. A breach relating to highly sensitive personal information, such as financial information, is more likely to meet this standard and require reporting. • The commissioner has interpreted “significant harm” to mean “a material harm...[having] non-trivial consequences or effects. Examples may include possible financial loss, identity theft, physical harm, humiliation or damage to one’s professional or personal reputation.”
  • 30. Responding to Data Breaches (cont.) • Manitoba's Personal Information Protection and Identity Theft Prevention Act (PIPITPA) – private sector law not yet in force • PIPITPA will generally require breach notification to an individual directly if personal information is lost, accessed or disclosed without authorization – no harm threshold • In Québec, the Commission d'accès à l'information du Québec ("CAI") in its 2011 Quinquennial Report entitled "Technology and Privacy, in a Time of Societal Choices" recommends to include, in both its public sector and private sector data protection laws, mandatory security breach reporting.
  • 31. Responding to Data Breaches (cont.) • PIPITPA will also create a private right of action for an individual to sue an organization for damages arising from its failure to: • protect personal information that is in its custody or control; or • provide reasonable notice if the organization was not satisfied that the lost, stolen or accessed information would be used lawfully. • Jurisdictions outside Canada may have extraterritorial implications, e.g. California has its own breach notification law
  • 32. Organizational Data and App Practices • Designate privacy and technology officers to ensure compliance under Canadian and foreign laws • Consult with the regulators when in doubt about systems and privacy policies • Have a data breach protocol plan in place - how to notify, who, and when? E.g. the regulators, individuals, ASAP • Limit access to electronic records to a need-to-know basis and password protect; control dissemination of apps • Draft and keep records of proper consents prior to collecting, using or disclosing any personal information or providing apps
  • 33. Organizational Data and App Practices (cont.) • Identify purposes for the collection, use and disclosure, and limit collection, use and disclosure to those purposes, which must be reasonable • Develop, implement and review privacy and security policies, CASL policy (see new CRTC Bulletin 2014-326), technology policy, including procurement, software, BYOD and services policies • Train employees and get acknowledgments • Protect personal information and data from theft, modification, and unauthorized access
  • 34. Organizational Data and App Practices (cont.) • Keep personal information only for as long as reasonable to carry out the business or legal purpose or as required by law and destroy or anonymize records once no longer needed • Develop a procedure for information requests/access, correction and deletion • Review and revise all contracts with third parties to ensure obligations flow through • “Stress test” data and app operations - privacy and data policies can be a marketing opportunity • After a data breach occurs, comply with data breach guidelines and notification requirements • Offer credit monitoring to clients
  • 35. Summary of Best Practices and Tips • The legal implications of cloud computing, privacy, security, confidentiality and data breaches involve many complex issues • Insist on provider transparency: participants/subcontractors, jurisdictions, data flow and processing, type of cloud and who has access • Engage all organizational teams that may have input to the cloud relationship, e.g. operational, procurement, contracts negotiation, privacy, employment (HR), compliance, audit, insurance, IT, security, risk, Board of Directors • Directors' liability for breach of their duties in risk management and oversight • Have proper testing, plans and policies in place • Get early involvement of experienced legal counsel
  • 36. Lisa K. Abe- Oldenburg, B.Comm., J.D. Abe-oldenburgL@bennettjones.com Tel.: 416-777-7475 www.bennettjones.com • This presentation contains statements of general principles and not legal opinions and should not be acted upon without first consulting a lawyer who will provide analysis and advice on a specific matter.
  • 37.
  • 38. Newsflash: Shift to Cloud Beats the Street IT spending forecast revised lower, amid shift to cloud and commodity products. Global IT spending will grow 2.1% to $3.7 trillion this year, a weaker performance than originally expected, although one that is still far stronger than the marginal gain of 2013, according to research firm Gartner Inc. The downward revision of more than one percentage point was attributed to product commoditization, heightened competition, and the shift to the cloud. “Things are starting to become commoditized faster than we expected,” Gartner analyst John Lovelock tells CIO Journal. And as individual lines of business command their own ever-growing technology budgets, spending on cloud-based applications is drawing funds away from traditional IT departments, whose spending power is “in trouble,”
  • 39. Cloud App Explosion 39 Driven by individual and line of business adoption of cloud and mobile. It’s how we do business. 2011 2016 $21.2B $92.8B 4.4xgrowth SaaSRevenue Forrester
  • 40. 40 There are 5,000 enterprise apps today (and growing).
  • 41. 41 Security & Risk Compliance Control Business Benefits Agility Cost Savings “To SaaS or not To SaaS….That is the Question!”
  • 42. Perspectives 42 • Legal – Bennett Jones, LLP • Corporate IT (CIO/CSO) – Sony • IT Sector: Cloud Access Security Broker – Netskope
  • 43. Highlights 43 • Business users are adopting consumer behaviors • Everything about data is changing • Consumerization is shifting IT architectures • Security risks arise with new architectures • A prescription for better security!
  • 44. Business users are adopting consumer behaviors 44 • Today’s Business Users – Do not ask if they can use new applications. They just install them. – Choose where they store data – Bring consumer attitudes to work…and expect IT to adapt! – Want to comply with security and compliance rules ..but want freedom to make decision on apps, data, and devices • Implication for IT: IT has no choice but to adapt, manage and control
  • 45. Everything about DATA is changing 45 Big Data Cloud Mobile
  • 46. 46 Why would you invest in Data Security ?
  • 47. Major SHIFT in enterprise architecture 47 Change your Security Strategy! Discover - Monitor - Control
  • 49. Security risks associated with a new architecture 49 • Network perimeter has blurred…or doesn’t exist • Multiple copies of data…only contractual based control with 3rd party • Access control…..no tools • If they get hacked, your data security is compromised – How do you disconnect from your responsibility? • IT will not have view into mobile apps transactions • Low standards to evaluate security of mobile apps • Security skills shortage
  • 50. A prescription for better security 50 • Create a security policy for Cloud – Include Apps, Data, Access Control • Do a skill set inventory – what you have and what you will need? • Build a future security architecture… it will not be perfect – How are you going to measure and manage? • Redefine your risk management process – Identify your assets…… you do not know. • Assess data security – Prepare to manage the security of data that is not in your control
  • 51. 51
  • 52. 52 Actual: 461 IT estimate: 40-50 76% cloud apps aren’t enterprise-ready Cloud procurement happens outside of IT Challenge: Get visibility and empower safe cloud usage App redundancy: •41 HR •27 storage •27 finance Source: Netskope Data
  • 53. 53 #1 Technology for Information Security in 2014 Analysts Examine Industry Trends at Gartner Security & Risk Management Summit, June 23-26, National Harbor, MD Cloud Access Security Brokers Cloud access security brokers are on-premises or cloud-based security policy enforcement points placed between cloud services consumers and cloud services providers to interject enterprise security policies as the cloud-based resources are accessed. In many cases, initial adoption of cloud-based services has occurred outside the control of IT, and cloud access security brokers offer enterprises to gain visibility and control as its users access cloud resources.
  • 54. 54 “Cool Vendors offer innovative, forward-thinking solution sets designed to address emerging and newly identified security challenges.”
  • 55. Mitigate Business Risk 55 Take Control of Cloud Apps Take Control of Cloud Apps Take Control of User Activities Take Control of User Activities Take Control of Data Take Control of Data Take Control of Compliance Take Control of Compliance 1. Understand the Cloud Apps usage, category, business function and Risk Assessment 2. Baseline sanctioned, departmental and individual cloud apps 3. Understand the high-level of data movement to/from the clouds 4. Coach & Establish Acceptable Use Policies (AUP) for cloud apps across business, departments and users 5. Understand the risky activity usage such as share, upload, download & administration across cloud apps 6. Understand the activities related to data movement across geo- locations between users and cloud apps 7. Monitor for Cloud App Usage Anomalies and Irregularities 8. Coach and establish Acceptable Use Policies (AUP) for Cloud App activities, users, devices, geo- locations and time 9. Audit and alert on sensitive data existing in & moving across cloud apps •PII, PCI, PHI, Intellectual Property 10. Coach, Alert and Block Sensitive Data uploads and shares 11. Encrypt data in the cloud for data- at-rest and use protection 12. Establish Acceptable Use Policy & Protection (AUP) for your corporate data based on app, content classification, app, department, user and geo-location 15% 40% 75% 90+% 13. Employ data audit & forensics 14. Records retention and retrieval 15. E-discovery compliance 16. PCI, PHIPA industry specific compliance 17. Business Compliance CASL, SOX, GLBA, .. 18. FINRA advanced regulation with ethical walls
  • 56. Provision-by-Purpose • Best User Experience, Security & Performance • Easy to deploy and Quick to value 56 Netskope: Comprehensive Cloud Security Platform Any App Any Device Anywhere DISCOVERY ANALYTICS ENFORCEMENT AppID Cloud App, Category, CCI AppID Cloud App, Category, CCI ActivityID Share, Upload, Download, Admin ActivityID Share, Upload, Download, Admin DataID PII, PCI, PHI, IP, … DataID PII, PCI, PHI, IP, … ActorID User, Device, Geo, Time, … ActorID User, Device, Geo, Time, … Deep Context Rich Enablement Services Sanctioned Business Apps Unsanctioned Apps Consumer Apps DLP, ENCRYPTION

Notes de l'éditeur

  1. By understanding cloud computing, the risks, and following the proposed recommendations, your organization can implement cloud computing that delivers better outcomes for your business at a lower cost.
  2. The complexity of legal compliance is sometimes overwhelming and many organizations have mistakenly assumed, or simply taken the position, that they cannot use a cloud service. However, that is not necessarily the case. For example, the Canadian federal Personal Information Protection and Electronic Documents Act (PIPEDA) and OSFI do not prohibit cloud computing, even when the cloud service provider (or a part of the cloud service provided) is in another country. In certain industries and provinces, such as the public sector and healthcare in BC and Nova Scotia, cross-border outsourcing or cloud services is prohibited unless certain exceptions apply. Regardless of what the cloud or SaaS contract says, your organization cannot escape compliance with the laws and regulations that apply to it -- and your organization is ultimately responsible for any liability that arises through the use of a third party service provider. In other words, you cannot contract out of your legal liability under the various statutes, regulations and guidelines that apply to your business. For example, financial institutions in Canada are subject to numerous rules and regulations governing outsourcing (which includes material cloud services) and data or records retention. As an organization using cloud services you must be careful to ensure the Cloud provider has the standards, controls and notification processes in place that meet regulatory compliance and guidance requirements applicable to your organization. --- The cloud model has been highly criticized for risk of data privacy and security breaches. Data protection and preservation in the cloud is a critical issue, in particular with respect to your regulatory and litigation compliance. As such, your organization must be able to halt the destruction of data done in the normal course of a cloud service provider's business. Your organization would also need the ability to retrieve the data in a usable form. The process by which electronic records retention and litigation holds are implemented in a cloud environment should be clearly established in the contract before procuring cloud services. Typical cloud service provider electronic data recycling processes and procedures involve the destruction of vast amounts of data across the entire cloud environment affecting more customers than just your organization. Thus, a cloud service provider may not be able to suspend these retention procedures without affecting other unrelated customers. Your organization should contractually ensure any requirements for data preservation are clearly understood and able to be implemented by its cloud service providers. Additionally, metadata associated with organization's data should be preserved. Depending on the system configuration and cloud service, the original metadata for electronic information stored in the cloud may no longer technically exist. It's important to note that in some cases, courts have sanctioned parties that did not produce metadata associated with their documents. Metadata can often assist in establishing the authenticity of the data and may be needed for a variety of e-discovery processing, review, or admissibility functions. Your procurement team should raise this issue with cloud service providers in the due diligence process and when negotiating the agreement.
  3. Cloud service providers often have a business model that includes profiting from BIG DATA analysis and sale. For example, mobile banking and payments involves the collection of more than just transaction data. Individuals' geolocations and movement patterns can be mapped, their product searches or preferences tagged, and their metadata analyzed and sold for marketing or other purposes. As an organization providing a service to your customers, you need to be aware of what the possible implications of BIG DATA usage could be, and ensure that your customers are protected and that their privacy rights are not being unknowingly violated. You also have to be prepared for new legal developments in this area (which requires the ability to amend your contracts for future legal compliance), as the Privacy Commissioner of Canada has issued a report with recommendations to make changes to PIPEDA in order to address BIG DATA concerns.
  4. Having a software license does not necessarily mean you are permitted to store and run the app in a cloud environment. You have to ensure, from a proper legal analysis, that the rights and restrictions in the license agreement permit you to do so.
  5. .
  6. We do these things in real-time, across any cloud app, and from any device, including mobile
  7. New Data – consumer behavior, likes, journey, purchase history, emotions,
  8. But blocking runs counter to business process. We found that 90% of cloud app usage was in apps that have blocked in some way shape or form at the perimeter, e.g., a next-gen firewall. Read this short blog entry for a description of how this happens: http://www.netskope.com/blog/netskope-cloud-report-exception-sprawl/ Source: The Netskope Cloud Report, April 2014
  9. However, for all of this cloud app goodness also comes tremendous cloud app sprawl. We at Netskope perform cloud assessments for our prospects and find that while IT usually estimates that they have about 40-50 apps running in their organizations (only a handful of which they manage), we discover between 400 and 500. Beyond the sheer volume of apps, the number of apps in business-critical or risky categories is surprising. In HR we find an average of 41 apps, and in finance/accounting, we find an average of 27. We also measure these apps’ enterprise-readiness, and find that more than three-quarters of them score a “medium” or below in our Cloud Confidence Index, which means they don’t meet enterprise standards for security, auditability, and business continuity. With the majority of cloud app procurement happening outside of IT, there is risk – risk of security events, data loss, and non-compliance. For IT, this creates a catch-22: Enable the cloud, but protect the business. Source: The Netskope Cloud Report, April 2014 72% of apps aren’t sanctioned by IT
  10. .
  11. Consider adding ‘admin’ audit related actions