SlideShare a Scribd company logo
Soumettre la recherche
Mettre en ligne
CSA & GRC Stack
Signaler
Partager
CloudSecurityAllianceAustralia
Suivre
•
1 j'aime
•
1,294 vues
1
sur
33
CSA & GRC Stack
•
1 j'aime
•
1,294 vues
Signaler
Partager
Télécharger maintenant
Télécharger pour lire hors ligne
Technologie
Business
Cloud Security Alliance
Lire la suite
CloudSecurityAllianceAustralia
Suivre
Recommandé
Democratizing IT Automation in a Multi-Cloud World par
Democratizing IT Automation in a Multi-Cloud World
Enterprise Management Associates
91 vues
•
34 diapositives
CSA Security Guidance Cloud Computing v3.0 par
CSA Security Guidance Cloud Computing v3.0
CloudSecurityAllianceAustralia
2.9K vues
•
177 diapositives
Cloud Governance Framework - Required Cloud Sourcing Capabilities par
Cloud Governance Framework - Required Cloud Sourcing Capabilities
SusanneT
4.5K vues
•
12 diapositives
Cloud computing-security-issues par
Cloud computing-security-issues
Aleem Mohammed
3.9K vues
•
40 diapositives
Global Mandate to Secure Cloud Computing par
Global Mandate to Secure Cloud Computing
CloudSecurityAllianceAustralia
933 vues
•
32 diapositives
Chap 6 cloud security par
Chap 6 cloud security
Raj Sarode
5.5K vues
•
17 diapositives
Contenu connexe
Tendances
Sukumar Nayak-Detailed-Cloud Risk Management and Audit par
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak
4.2K vues
•
65 diapositives
4.5.cloud security par
4.5.cloud security
DrRajapraveenkN
36 vues
•
9 diapositives
Cloud Computing Security Issues in Infrastructure as a Service” par
Cloud Computing Security Issues in Infrastructure as a Service”
Vivek Maurya
2.9K vues
•
19 diapositives
SaaS Challenges & Security Concerns par
SaaS Challenges & Security Concerns
Kannan Subbiah
5.6K vues
•
28 diapositives
Security As A Service In Cloud(SECaaS) par
Security As A Service In Cloud(SECaaS)
أحلام انصارى
11.4K vues
•
14 diapositives
Multitenant, Dedicated or Hybrid - Which cloud to choose? par
Multitenant, Dedicated or Hybrid - Which cloud to choose?
RapidScale
2.1K vues
•
19 diapositives
Tendances
(20)
Sukumar Nayak-Detailed-Cloud Risk Management and Audit par Sukumar Nayak
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak
•
4.2K vues
4.5.cloud security par DrRajapraveenkN
4.5.cloud security
DrRajapraveenkN
•
36 vues
Cloud Computing Security Issues in Infrastructure as a Service” par Vivek Maurya
Cloud Computing Security Issues in Infrastructure as a Service”
Vivek Maurya
•
2.9K vues
SaaS Challenges & Security Concerns par Kannan Subbiah
SaaS Challenges & Security Concerns
Kannan Subbiah
•
5.6K vues
Security As A Service In Cloud(SECaaS) par أحلام انصارى
Security As A Service In Cloud(SECaaS)
أحلام انصارى
•
11.4K vues
Multitenant, Dedicated or Hybrid - Which cloud to choose? par RapidScale
Multitenant, Dedicated or Hybrid - Which cloud to choose?
RapidScale
•
2.1K vues
Keys to success and security in the cloud par Scalar Decisions
Keys to success and security in the cloud
Scalar Decisions
•
909 vues
Scaling the Cloud - Cloud Security par Bill Burns
Scaling the Cloud - Cloud Security
Bill Burns
•
8.1K vues
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9) par Glenn Ambler
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
Glenn Ambler
•
59 vues
Evaluation Of The Data Security Methods In Cloud Computing Environments par ijfcstjournal
Evaluation Of The Data Security Methods In Cloud Computing Environments
ijfcstjournal
•
3.2K vues
Introduction to Cloud Computing and Security par Oran Epelbaum
Introduction to Cloud Computing and Security
Oran Epelbaum
•
266 vues
Cloud Security: A New Perspective par Wen-Pai Lu
Cloud Security: A New Perspective
Wen-Pai Lu
•
1.5K vues
Microsoft Private Cloud Strategy par Amit Gatenyo
Microsoft Private Cloud Strategy
Amit Gatenyo
•
4.2K vues
Cloud Security par AWS User Group Bengaluru
Cloud Security
AWS User Group Bengaluru
•
12.4K vues
DAM 2018 Review, What's next 2019 ? par Activo Consulting
DAM 2018 Review, What's next 2019 ?
Activo Consulting
•
526 vues
CCSK Certificate of Cloud Computing Knowledge - overview par Peter HJ van Eijk
CCSK Certificate of Cloud Computing Knowledge - overview
Peter HJ van Eijk
•
4.1K vues
Cloud Security ("securing the cloud") par Vic Winkler
Cloud Security ("securing the cloud")
Vic Winkler
•
1.4K vues
Cloud Services: Types of Cloud par Dr. Sunil Kr. Pandey
Cloud Services: Types of Cloud
Dr. Sunil Kr. Pandey
•
239 vues
Security & Privacy In Cloud Computing par saurabh soni
Security & Privacy In Cloud Computing
saurabh soni
•
2.5K vues
Cloud Computing Security Issues par Discover Cloud Computing
Cloud Computing Security Issues
Discover Cloud Computing
•
10.1K vues
Similaire à CSA & GRC Stack
Cloud Security Alliance's GRC Stack Overview par
Cloud Security Alliance's GRC Stack Overview
Valdez Ladd MBA, CISSP, CISA,
4.6K vues
•
34 diapositives
5787355.ppt par
5787355.ppt
ahmad21315
2 vues
•
193 diapositives
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements par
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Phil Agcaoili
622 vues
•
45 diapositives
CCSK, cloud security framework, Indonesia par
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
2.9K vues
•
41 diapositives
Oracle Keynote Cloud Expo 11-04-09 par
Oracle Keynote Cloud Expo 11-04-09
Rex Wang
4.2K vues
•
32 diapositives
Effectively and Securely Using the Cloud Computing Paradigm par
Effectively and Securely Using the Cloud Computing Paradigm
fanc1985
1.2K vues
•
82 diapositives
Similaire à CSA & GRC Stack
(20)
Cloud Security Alliance's GRC Stack Overview par Valdez Ladd MBA, CISSP, CISA,
Cloud Security Alliance's GRC Stack Overview
Valdez Ladd MBA, CISSP, CISA,
•
4.6K vues
5787355.ppt par ahmad21315
5787355.ppt
ahmad21315
•
2 vues
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements par Phil Agcaoili
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Phil Agcaoili
•
622 vues
CCSK, cloud security framework, Indonesia par Wise Pacific Venture
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
•
2.9K vues
Oracle Keynote Cloud Expo 11-04-09 par Rex Wang
Oracle Keynote Cloud Expo 11-04-09
Rex Wang
•
4.2K vues
Effectively and Securely Using the Cloud Computing Paradigm par fanc1985
Effectively and Securely Using the Cloud Computing Paradigm
fanc1985
•
1.2K vues
3245224.ppt par ahmad21315
3245224.ppt
ahmad21315
•
11 vues
Oracle Cloud Computing Strategy par Rex Wang
Oracle Cloud Computing Strategy
Rex Wang
•
17.5K vues
Gitex journey to the cloud par Jorge Sebastiao
Gitex journey to the cloud
Jorge Sebastiao
•
765 vues
Security Building Blocks of the IBM Cloud Computing Reference Architecture par Stefaan Van daele
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Stefaan Van daele
•
2.3K vues
Keys-to-Success-and-Security-in-the-Cloud par patmisasi
Keys-to-Success-and-Security-in-the-Cloud
patmisasi
•
213 vues
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26 par Bill Annibell
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Bill Annibell
•
3.8K vues
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26 par TT L
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
TT L
•
1.4K vues
Cloud Ecosystems A Perspective par jmcdaniel650
Cloud Ecosystems A Perspective
jmcdaniel650
•
1K vues
Lucw lsec-securit-20110907-4-final-5 par Luc Wijns
Lucw lsec-securit-20110907-4-final-5
Luc Wijns
•
976 vues
Securing Your CI Pipeline with HashiCorp Vault - P2 par Ashnikbiz
Securing Your CI Pipeline with HashiCorp Vault - P2
Ashnikbiz
•
119 vues
Cloud Computing par Alicja Sieminska
Cloud Computing
Alicja Sieminska
•
1.3K vues
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud par IOSR Journals
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
IOSR Journals
•
811 vues
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report par Iftikhar Ali Iqbal
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
Iftikhar Ali Iqbal
•
693 vues
Implementing security groups in open stack par Rishabh Agarwal
Implementing security groups in open stack
Rishabh Agarwal
•
163 vues
Dernier
SUPPLIER SOURCING.pptx par
SUPPLIER SOURCING.pptx
angelicacueva6
15 vues
•
1 diapositive
Empathic Computing: Delivering the Potential of the Metaverse par
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst
478 vues
•
80 diapositives
Transcript: The Details of Description Techniques tips and tangents on altern... par
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada
136 vues
•
15 diapositives
Microsoft Power Platform.pptx par
Microsoft Power Platform.pptx
Uni Systems S.M.S.A.
53 vues
•
38 diapositives
AMAZON PRODUCT RESEARCH.pdf par
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta
26 vues
•
13 diapositives
Unit 1_Lecture 2_Physical Design of IoT.pdf par
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec
12 vues
•
36 diapositives
Dernier
(20)
SUPPLIER SOURCING.pptx par angelicacueva6
SUPPLIER SOURCING.pptx
angelicacueva6
•
15 vues
Empathic Computing: Delivering the Potential of the Metaverse par Mark Billinghurst
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst
•
478 vues
Transcript: The Details of Description Techniques tips and tangents on altern... par BookNet Canada
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada
•
136 vues
Microsoft Power Platform.pptx par Uni Systems S.M.S.A.
Microsoft Power Platform.pptx
Uni Systems S.M.S.A.
•
53 vues
AMAZON PRODUCT RESEARCH.pdf par JerikkLaureta
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta
•
26 vues
Unit 1_Lecture 2_Physical Design of IoT.pdf par StephenTec
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec
•
12 vues
Info Session November 2023.pdf par AleksandraKoprivica4
Info Session November 2023.pdf
AleksandraKoprivica4
•
12 vues
HTTP headers that make your website go faster - devs.gent November 2023 par Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn
•
22 vues
Ransomware is Knocking your Door_Final.pdf par Security Bootcamp
Ransomware is Knocking your Door_Final.pdf
Security Bootcamp
•
55 vues
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive par Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Network Automation Forum
•
31 vues
PRODUCT PRESENTATION.pptx par angelicacueva6
PRODUCT PRESENTATION.pptx
angelicacueva6
•
14 vues
Network Source of Truth and Infrastructure as Code revisited par Network Automation Forum
Network Source of Truth and Infrastructure as Code revisited
Network Automation Forum
•
26 vues
Voice Logger - Telephony Integration Solution at Aegis par Nirmal Sharma
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma
•
39 vues
Case Study Copenhagen Energy and Business Central.pdf par Aitana
Case Study Copenhagen Energy and Business Central.pdf
Aitana
•
16 vues
Attacking IoT Devices from a Web Perspective - Linux Day par Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri
•
16 vues
Vertical User Stories par Moisés Armani Ramírez
Vertical User Stories
Moisés Armani Ramírez
•
14 vues
Igniting Next Level Productivity with AI-Infused Data Integration Workflows par Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software
•
263 vues
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ... par Prity Khastgir IPR Strategic India Patent Attorney Amplify Innovation
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...
Prity Khastgir IPR Strategic India Patent Attorney Amplify Innovation
•
29 vues
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors par sugiuralab
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab
•
19 vues
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... par James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson
•
85 vues
CSA & GRC Stack
1.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. Cloud Security Alliance & GRC Stack Materials by Cloud Security Alliance.org © & PCI in the cloud training, created by SecurityWarrior LLC for Cloud Security Alliance , & Prof. Kai Hwang, University of Southern California Presented to Triad ISSA, NC January 26, 2012 Valdez Ladd, ISSA Raleigh, NC 2012 1
2.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. About the Cloud Security Alliance Global, not-for-profit organization Building best practices and a trusted cloud ecosystem Comprehensive research and tools Certificate of Cloud Security Knowledge (CCSK) www.cloudsecurityalliance.org 2
3.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. Presentation Outline Introduction What this class is about, prerequisites, how to benefit Cloud basics PCI DSS + cloud scenario for example Cloud Security Alliance toolsets: Control Matrix, Consensus Assessments, etc., Conclusions and action items 3
4.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. Cloud? 4
5.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. NIST Definition of Cloud Computing “Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. “ 55
6.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. 5 Essential Cloud Characteristics 1. On-demand self-service 2. Broad network access 3. Resource pooling – Location independence 4. Rapid elasticity 5. Measured service 66
7.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. 3 Cloud Service Models 1. Cloud Software as a Service (SaaS) – Use provider’s applications over a network 2. Cloud Platform as a Service (PaaS) – Deploy customer-created applications to a cloud 3. Cloud Infrastructure as a Service (IaaS) – Rent processing, storage, network capacity, and other fundamental computing resources To be considered “cloud” they must be deployed on top of cloud infrastructure that has the essential characteristics 7
8.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. 4 Cloud Deployment Models Private cloud Enterprise owned or leased Community cloud Shared infrastructure for specific community Public cloud <- our focus in this class! Sold to the public, mega-scale infrastructure Hybrid cloud Composition of two or more clouds 88
9.
© 2011 Cloud
Security Alliance, Inc. All rights reserved.
10.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. 7 Common Cloud Characteristics 1. Massive scale 2. Homogeneity 3. Virtualization 4. Resilient computing 5. Low cost software 6. Geographic distribution 7. Service orientation 10
11.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. All of this TOGETHER: The Cloud Community Cloud Private Cloud Public Cloud Hybrid Clouds Deployment Models Service Models Essential Characteristics Common Characteristics Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Resource Pooling Broad Network Access Rapid Elasticity Measured Service On Demand Self-Service Low Cost Software Virtualization Service Orientation Advanced Security Homogeneity Massive Scale Resilient Computing Geographic Distribution 1111
12.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. Example IaaS// Amazon Cloud Amazon cloud components – Elastic Compute Cloud (EC2) • Run your own or Amazon’s OS “instances” – Simple Storage Service (S3) – SimpleDB – Other services 1212
13.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. Example PaaS// Google App Engine Create, deploy and run applications NO control (or, in fact, even visibility) of OS Use SDK to develop the applications Run “natively” in the cloud 13
14.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. Example SaaS// Salesforce Well-known SaaS CRM application Cloud CRM + a lot more applications 1414
15.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. Example P/IaaS // Azure Source: Microsoft Presentation, A Lap Around Windows Azure, Manuvir Das 1515
16.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. Service Model Architectures Cloud Infrastructure IaaS PaaS SaaS Infrastructure as a Service (IaaS) Architectures Platform as a Service (PaaS) Architectures Software as a Service (SaaS) Architectures Cloud Infrastructure SaaS Cloud Infrastructure PaaS SaaS Cloud Infrastructure IaaS PaaS Cloud Infrastructure PaaS Cloud Infrastructure IaaS 1616
17.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. 18 Security: Barrier to Adoption?
18.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. 19 What is Different about Cloud?
19.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. Security Relevant Cloud Components Cloud Provisioning Services Cloud Data Storage Services Cloud Processing Infrastructure Cloud Support Services Cloud Network and Perimeter Security Elastic Elements: Storage, Processing, and Virtual Networks 2020
20.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. 21 What is Different about Cloud? SERVICE OWNER SaaS PaaS IaaS Data Joint Tenant Tenant Application Joint Joint Tenant Compute Provider Joint Tenant Storage Provider Provider Joint Network Provider Provider Joint Physical Provider Provider Provider
21.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. 22 What is Different about Cloud?
22.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. 23 What is Different about Cloud?
23.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. CSA Cloud “Threats” 1. Abuse & Nefarious Use of Cloud Computing 2. Insecure Interfaces & APIs 3. Malicious Insiders 4. Shared Technology Issues 5. Data Loss or Leakage 6. Account or Service Hijacking 7. Unknown Risk Profile 24
24.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. ENISA Cloud Computing Risk Assessment http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment 1. Loss of governance 2. Lock-in 3. Isolation failure 4. Compliance risks 5. Management interface compromise 6. Data protection 7. Insecure or incomplete data deletion 8. Malicious insider 25
25.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. Cloud “Threats” – Top 3 1. Authentication abuse 2. Operations breakdown 3. Misuse of cloud-specific technology 26
26.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. FBI Takes Cloud Away 27
27.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. While we are “in the cloud” Here are some additional CSA/cloud security resources… 28
28.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. CSA GRC Stack Bringing it all together to peel back the layers of control ownership and address concerns for trusted Cloud adoption. 29 Control Requirements Provider Assertions Private, Community & Public Clouds
29.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. CSA CloudAudit Open standard and API to automate provider audit assertions Change audit from data gathering to data analysis Necessary to provide audit & assurance at the scale demanded by cloud providers Uses Cloud Controls Matrix as controls namespace Use to instrument cloud for continuous controls monitoring 30
30.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. CSA Cloud Controls Matrix 31 Controls derived from guidance Mapped to familiar frameworks: ISO 27001, COBIT, PCI, HIPAA Rated as applicable to SaaS/PaaS/IaaS Customer vs Provider role Help bridge the “cloud gap” for IT & IT auditors https://cloudsecurityalliance.org/research/projects/cloud-controls-matrix-ccm/
31.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. 32 Next?
32.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. Thanks for Your Review! Acknowledgement to Dr. Anton Chuvakin, SecurityWarrior LLC for Cloud Security Alliance, Cloud Security Alliance.org, Materials by Cloud Security Alliance.org © & PCI in the cloud training, created by for Triad ISSA, NC January 26, 2012 Valdez Ladd, ISSA Raleigh, NC 2011 33
33.
© 2011 Cloud
Security Alliance, Inc. All rights reserved. 34