SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
1
Latest Developments in Cloud Security
Standards and Privacy
http://www.cloud-council.org/deliverables/cloud-security-standards-what-to-expect-
and-what-to-negotiate.htm
November 17, 2016
2
Today’s Speakers
Tracie Berardi
Program Manager, Cloud Standards Customer Council
Claude Baudoin
Principal, cébé IT & Knowledge Management
Energy Domain Consultant, OMG
Mike Edwards
Cloud Computing Standards Expert and Bluemix PaaS Evangelist, IBM
Alexander Tumashov
IT Cloud & Server Integration Manager, Schlumberger
3
The Cloud Standards Customer Council
• Provide customer-led guidance to multiple cloud
standards-defining bodies
• Establishing criteria for open
standards based cloud computing 650+ Organizations
participating
2011/2012 Deliverables
 Practical Guide to Cloud Computing
 Practical Guide to Cloud SLAs
 Security for Cloud Computing
 Impact of Cloud on Healthcare
2013/2014 Deliverables
 Convergence of SoMoClo
 Analysis of Public Cloud SLAs
 Cloud Security Standards
 Migrating Apps to Public Cloud Services
 Social Business in the Cloud
 Big Data in the Cloud
 Practical Guide to Cloud Computing V2
 Migrating Apps: Performance Rqmnts
 Cloud Interoperability/Portability
http://cloud-council.org
2015 Deliverables
 Web App Hosting Architecture
 Mobile Cloud Architecture
 Big Data Cloud Architecture
 Security for Cloud Computing V2
 Practical Guide to Cloud SLAs V2
 Practical Guide to PaaS
THE Customer’s Voice for Cloud Standards!
2016 Projects
 Prac Guide to Hybrid Cloud Computing
 Public Cloud Service Agreements, V2
 Cloud Security Standards, V2
 IoT Cloud Reference Architecture
 Commerce Cloud Reference Architecture
 More
4
What’s New in V2 ?
• V1 was published in 2013
• Cloud security standards landscape has changed significantly
• Increase in stringent laws and regulations relating to personally
identifiable information (PII) in many countries
• An example is the EU General Data Protection Regulation (GDPR) which applies to
processing of PII of EU citizens
• Cloud specific security standards are being more widely adopted
• The paper has been updated to reflect these developments, highlighting
standards like ISO/IEC 27018 & ISO/IEC 27017 and associated
certifications
5
Cloud Security Standards: Benefits
• Standards promote interoperability, reducing vendor lock-in
• Standards facilitate hybrid cloud computing by making it easier to
integrate on-premises security technologies with those of cloud
service providers (CSPs)
• Standards provide assurance that best practices are being followed
both internally within an enterprise and by CSPs
• Standards support provides an effective means by which cloud
service customers can compare and contrast CSPs
• Standards support enables an easier path to regulatory compliance
6
Standards Specifications
 Define APIs and protocols
 Extensibility - optional functions
that go beyond those defined in
standard
 Formal certifications not provided -
compliance and interoperability
test suites may be available
Examples
OAuth 2.0, SAML 2.0, SSL/TLS,
X.509
Cloud Security Standards: Current Landscape
Advisory Standards
 Interpreted and applied to all types
and sizes of organizations
 Flexibility: latitude to adopt
information security controls that
make sense to users
 Unsuitable for compliance testing
Examples
ISO 27002, ISO 38500, COBIT
Security Frameworks
 Define specific policies, controls,
checklists, procedures
 Define processes for examining
support - auditors use to assess &
measure CSP conformance
 Suitable for compliance testing
Examples
ISO/IEC 27001, ISO/IEC 27017,
ISO/IEC 27018
Cloud security standards - maturing
 Different types of standards need to be considered
 Formal standards specific to cloud security already published
General IT security standards applicable to cloud computing
 Insist that cloud service providers support these
Cloud service customers: insist on security certifications from providers
 Cloud specific security certifications available today (emerging)
 Existing general security certifications are applicable
7
Companion whitepaper: Security for Cloud Computing: 10 Steps to Ensure Success
 A reference to help enterprise IT analyze security capabilities of CSPs
 Available on CSCC Resource Hub: http://www.cloud-council.org/resource-hub
10 Steps to Evaluate Cloud Security
10 Steps to Evaluate Cloud Security
1. Ensure effective governance, risk & compliance
2. Audit operational & business processes
3. Manage people, roles & identities
4. Ensure proper protection of data & information
5. Enforce privacy policies
6. Assess the security provisions for cloud applications
7. Ensure cloud networks & connections are secure
8. Evaluate security controls on physical infrastructure & facilities
9. Manage security terms in the cloud service agreement
10. Understand the security requirements of the exit process
8
Step 1: Ensure effective governance, risk and compliance
GRC Requirements
 Cloud computing presents different risks than traditional
IT solutions
 Customers must understand their risk tolerance and
must focus on mitigating the risks that are most crucial
to the organization
 Customers must fully understand specific laws or
regulations that apply to the services (data retention,
privacy requirements, etc.)
 Customers should be notified if any breach occurs
regardless if the customer is directly impacted
 Primary means to ensure application and data security is
through Cloud Service Agreement
 General IT governance standards apply to cloud
 Country & industry specific governance standards also
apply
CSF
General IT Governance Standards
Country / Industry Standards
9
Step 2: Audit operational & business processes
Audit Requirements
 Security audit of cloud service providers
is essential
 Security audits should be carried out by
appropriately skilled staff
 Security audits should leverage an
established standard for security controls
 Typically done as part of a formal
certification process
 Insist on ISO/IEC 27001 and ISO/IEC
27017 or equivalent certification
 For cloud services with impact on
financial activities seek SSAE 16
certification
10
Step 3: Manage people, roles & identities
Considerations
 Cloud service provider should support:
• Federated identity management
• Delegated user administration
• Single sign-on
• Strong, multi-factor, mutual and/or
even biometric authentication
• Role, entitlement and policy
management
• Identity & Access audit
 Any access to the provider’s management
platform should be monitored and logged
 Several standards available for federated
IDs, single sign-on and access control
WS-Federation
11
Step 4: Ensure proper protection of data & information
Considerations
 Security considerations apply to data at rest
as well as data in motion
 Controls for securing data in the cloud:
• Create a data asset catalog
• Consider all forms of data
• Consider privacy requirements
• Apply confidentiality, integrity and
availability principles
• Apply identify and access
management
 Seek security standards for control
framework, data in motion and data
encryption
KMIP
Data Encryption Standards
Data In Motion Standards
Control Standards
12
Step 5: Enforce policies for Protection of Personal Data
Considerations
 “Privacy”: acquisition, storage, use of personally
identifiable information (PII)
• Gaining importance
• Law and regulations usually apply
 Privacy requirements include:
• Limitations on use of and access to PII
• Tagging PII data correctly
• Securing storage of PII
• Limiting access to authorized users
 Specific types of PII require special treatment
• Health data: HIPAA
• Credit card data: PCI-DSS
 Privacy issues should be addressed in CSA
• ISO/IEC 19086 Cloud SLAs
 Required controls specified in ISO/IEC 27018
EU-US Privacy Shield
13
Step 6: Assess the security provisions for cloud applications
Considerations
 Application security in cloud environment over complete
lifecycle
• Secure development, secure deployment
(OWASP, ISO 27034)
• Security testing (NIST 800-115)
 Deployment model impacts application security
• Infrastructure as a Service
• Customer responsible for majority of security
components
• Platform as a Service
• Provider responsible to provide secure operating
system, middleware, network
• Customer responsible for application security
• Software as a Service
• Provider provides application security
• Customer must understand data encryption
standards, audit capabilities, SLAs
ISO 27034
Application Security
SP 800-115
14
Step 7: Ensure cloud networks & connections are secure
Considerations
 Customer should gain assurance on
provider’s internal and external network
security
 Areas of concern
• Confidentiality Integrity Availability
 External network requirements
• Traffic screening
• Intrusion detection / prevention
• Logging and notification
 Internal network requirements
• Protect clients from each other
• Protect the provider’s network
• Monitor for intrusion attempts
 ISO 27033 addresses network security
 NIST 800-53 R4 has useful controls
 FedRAMP specifies specific controls
ISO 27033
Network Security
15
Considerations
 Customer should gain assurance on provider’s
physical security
• Physical infrastructure & facilities should
be in a secure area
• Protection against external &
environmental threats
• Control of personnel in working areas
• Equipment security controls
• Controls on supporting utilities
• Control security of cabling
• Proper equipment maintenance
• Removal & disposal of assets
• Human resource security
• DR & BC plans in place
 Look for certification to ISO/IEC 27002 standard
 ANSI TIA-942 covers physical security
ISO 27002
Security Techniques: Code of Practice
for Information Security Controls
TIA-942
Step 8: Evaluate security controls on physical infrastructure & facilities
16
Considerations
 Understand who is responsible for what (provider or
customer)
 CSA should specify that (and how) customer is notified
of security incidents
 CSA must also cover recovery measures and customer
compensation
 Security clauses in the CSA apply to cloud provider as
well as its subcontractors
 SLAs must include metrics for performance and
effectiveness of information security management
(see ISO/IEC 27004 and 19086, NIST 800-55 and CIS
Consensus Metrics)
 Data protection should follow ISO/IEC 27018
 Require compliance reports to covering security
controls, services and mechanisms
 ISO/IEC 27017 specializes ISO/IEC 27002 to the cloud
ISO/IEC 19086
ISO/IEC 27004
ISO/IEC 27017
ISO/IEC 27018
SP 800-55
CIS Consensus
Metrics 1.1.0
Common
Weakness
Enumeration
STAR
Registry
TR178
Step 9: Manage security terms in the cloud service agreement (CSA)
17
Step 10: Understand the security requirements of the exit process
Considerations
 Once termination process is complete, “the
right to be forgotten” should be achieved
 No customer data should reside with
provider after the exit process
 Require provider to cleanse log and audit
data
• Some jurisdictions may require
retention of records of this type for
specified periods by law
 Exit process must allow customer a smooth
transition without loss or breach of data
 The emerging ISO/IEC 19086 standard
contains language on the exit process
ISO/IEC 19086
Cloud Computing – Service
Level Agreement Framework
18
Cloud Security Certifications
Certification
 Means by which provider demonstrates conformance
to standard / specification
• Typically for specific services
 Certificate typically issued via third-party auditor
• Belongs to certification organization
• Certification issued on regular basis
 Certification organization in turn accredited by
national body
• Establish skill & procedure requirements for audits
Relevant certifications
 ISO/IEC 27001 & ISO/IEC 27017 (information security)
 ISO/IEC 27018 (privacy)
 TRUSTe Safe Harbor (privacy)
19
Recommendations
 Expect CSP support for suitable standards
 General governance
• Use COBIT, ISO 20000, SSAE 16, ITIL
 Information systems security
• Use ISO 27017 & 27018
 Federated IDs / SSO
• Use widely accepted standards like LDAP, SAML 2.0, OAuth 2.0
 Secure data in motion
• Use HTTPS, SFTP, VPN
 Encrypt static data
• Follow FIPS 140-2
• Use KMIP to manage keys
 Network Security
• Use ISO 27033 & NIST SP 800-53
 Certifications
 ISO 27001
 ISO 27017 or equivalent
 For privacy, ISO/IEC 27018 or equivalent
20
• Join the CSCC Now!
• To have an impact on customer use case based standards
requirements
• To learn about all Cloud Standards within one organization
• To help define the CSCC’s future roadmap
• Membership is free & easy: http://www.cloud-council.org/become-
a-member
• Get Involved!
• Join one or more of the CSCC Working Groups
• http://www.cloud-council.org/workinggroups
• Leverage CSCC Collateral!
• Visit http://www.cloud-council.org/resource-hub
Call to Action
21
Thank You!

Contenu connexe

Tendances

Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak
 
Sukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak
 
Cloud Customer Architecture for Big Data and Analytics V2.0
Cloud Customer Architecture for Big Data and Analytics V2.0Cloud Customer Architecture for Big Data and Analytics V2.0
Cloud Customer Architecture for Big Data and Analytics V2.0
Cloud Standards Customer Council
 

Tendances (20)

Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
 
Cloud Governance Framework - Required Cloud Sourcing Capabilities
Cloud Governance Framework - Required Cloud Sourcing CapabilitiesCloud Governance Framework - Required Cloud Sourcing Capabilities
Cloud Governance Framework - Required Cloud Sourcing Capabilities
 
Cloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesCloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and Techniques
 
Interoperability and Portability for Cloud Computing: A Guide V2.0
Interoperability and Portability for Cloud Computing: A Guide V2.0Interoperability and Portability for Cloud Computing: A Guide V2.0
Interoperability and Portability for Cloud Computing: A Guide V2.0
 
Hybrid Cloud Considerations for Big Data and Analytics
Hybrid Cloud Considerations for Big Data and AnalyticsHybrid Cloud Considerations for Big Data and Analytics
Hybrid Cloud Considerations for Big Data and Analytics
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
 
Tci reference architecture_v2.0
Tci reference architecture_v2.0Tci reference architecture_v2.0
Tci reference architecture_v2.0
 
Sukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud Management
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
 
Lessons learnt building a Distributed Linked List on S3
Lessons learnt building a Distributed Linked List on S3Lessons learnt building a Distributed Linked List on S3
Lessons learnt building a Distributed Linked List on S3
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and Frontiers
 
Cloud Security Fundamentals Webinar
Cloud Security Fundamentals WebinarCloud Security Fundamentals Webinar
Cloud Security Fundamentals Webinar
 
Cloud Customer Architecture for Big Data and Analytics V2.0
Cloud Customer Architecture for Big Data and Analytics V2.0Cloud Customer Architecture for Big Data and Analytics V2.0
Cloud Customer Architecture for Big Data and Analytics V2.0
 
Cloud Customer Architecture for Big Data and Analytics
Cloud Customer Architecture for Big Data and AnalyticsCloud Customer Architecture for Big Data and Analytics
Cloud Customer Architecture for Big Data and Analytics
 
4.5.cloud security
4.5.cloud security4.5.cloud security
4.5.cloud security
 

En vedette

5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet
Ana Meskovska
 
The state of the internet
The state of the internetThe state of the internet
The state of the internet
Mateo Budinich
 
Cloud Standards: EnablingInteroperability.and.package.delivery
Cloud Standards: EnablingInteroperability.and.package.deliveryCloud Standards: EnablingInteroperability.and.package.delivery
Cloud Standards: EnablingInteroperability.and.package.delivery
Abiquo, Inc.
 
NIST Cloud Computing Standards
NIST Cloud Computing StandardsNIST Cloud Computing Standards
NIST Cloud Computing Standards
GovCloud Network
 
Design and implementation of an integrated management system based on open so...
Design and implementation of an integrated management system based on open so...Design and implementation of an integrated management system based on open so...
Design and implementation of an integrated management system based on open so...
Scatol8
 

En vedette (20)

Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
 
OGF Cloud Standards: Current status and ongoing interoperability efforts wi...
OGF Cloud Standards: Current status and ongoing interoperability efforts wi...OGF Cloud Standards: Current status and ongoing interoperability efforts wi...
OGF Cloud Standards: Current status and ongoing interoperability efforts wi...
 
5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet
 
Cloud Standards in the Real World: Cloud Standards Testing for Developers
Cloud Standards in the Real World: Cloud Standards Testing for DevelopersCloud Standards in the Real World: Cloud Standards Testing for Developers
Cloud Standards in the Real World: Cloud Standards Testing for Developers
 
Cloud Standards and Virtualization
Cloud Standards and VirtualizationCloud Standards and Virtualization
Cloud Standards and Virtualization
 
The state of the internet
The state of the internetThe state of the internet
The state of the internet
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
Peter Mell Cloud Standards 20090915
Peter Mell Cloud Standards 20090915Peter Mell Cloud Standards 20090915
Peter Mell Cloud Standards 20090915
 
Privacy and Security policies in the cloud
Privacy and Security policies in the cloudPrivacy and Security policies in the cloud
Privacy and Security policies in the cloud
 
Cloud Standards: EnablingInteroperability.and.package.delivery
Cloud Standards: EnablingInteroperability.and.package.deliveryCloud Standards: EnablingInteroperability.and.package.delivery
Cloud Standards: EnablingInteroperability.and.package.delivery
 
NIST Cloud Computing Standards
NIST Cloud Computing StandardsNIST Cloud Computing Standards
NIST Cloud Computing Standards
 
Cloud Customer Architecture for IoT
Cloud Customer Architecture for IoTCloud Customer Architecture for IoT
Cloud Customer Architecture for IoT
 
Unolegal TOOL (Privacy Day 2016)
Unolegal TOOL (Privacy Day 2016)Unolegal TOOL (Privacy Day 2016)
Unolegal TOOL (Privacy Day 2016)
 
Interoperability and Portability for Cloud Computing: A Guide
Interoperability and Portability for Cloud Computing: A GuideInteroperability and Portability for Cloud Computing: A Guide
Interoperability and Portability for Cloud Computing: A Guide
 
The Latest in Cloud Computing Standards
The Latest in Cloud Computing StandardsThe Latest in Cloud Computing Standards
The Latest in Cloud Computing Standards
 
Design and implementation of an integrated management system based on open so...
Design and implementation of an integrated management system based on open so...Design and implementation of an integrated management system based on open so...
Design and implementation of an integrated management system based on open so...
 
PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESSPRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
 
Cloud Customer Architecture for Hybrid Integration
Cloud Customer Architecture for Hybrid IntegrationCloud Customer Architecture for Hybrid Integration
Cloud Customer Architecture for Hybrid Integration
 
Benefits of Integrated Management Systems
Benefits of Integrated Management SystemsBenefits of Integrated Management Systems
Benefits of Integrated Management Systems
 
Integrated management systems
Integrated management systemsIntegrated management systems
Integrated management systems
 

Similaire à Latest Developments in Cloud Security Standards and Privacy

gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2
Anne Starr
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2
Anne Starr
 

Similaire à Latest Developments in Cloud Security Standards and Privacy (20)

Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2
 
Cloud Security.ppt
Cloud Security.pptCloud Security.ppt
Cloud Security.ppt
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2
 
AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your Data
 
Integrated Compliance Webinar.pptx
Integrated Compliance Webinar.pptxIntegrated Compliance Webinar.pptx
Integrated Compliance Webinar.pptx
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloud
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
 
Introduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixIntroduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls Matrix
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
 
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
 
ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?
 
GDPR Compliance Countdown - Is your Application environment ready?
GDPR Compliance Countdown - Is your Application environment ready?GDPR Compliance Countdown - Is your Application environment ready?
GDPR Compliance Countdown - Is your Application environment ready?
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Governing in the Cloud
Governing in the CloudGoverning in the Cloud
Governing in the Cloud
 
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azure
 

Plus de Cloud Standards Customer Council

Plus de Cloud Standards Customer Council (16)

Kubernetes and Container Technologies from Cloud Native Computing Foundation
Kubernetes and Container Technologies from Cloud Native Computing FoundationKubernetes and Container Technologies from Cloud Native Computing Foundation
Kubernetes and Container Technologies from Cloud Native Computing Foundation
 
What's New in Cloud Foundry
What's New in Cloud FoundryWhat's New in Cloud Foundry
What's New in Cloud Foundry
 
Where's My Data? Managing the Data Residency Challenge
Where's My Data? Managing the Data Residency ChallengeWhere's My Data? Managing the Data Residency Challenge
Where's My Data? Managing the Data Residency Challenge
 
Hyperledger: Market, Technology & Community Update
Hyperledger: Market, Technology & Community UpdateHyperledger: Market, Technology & Community Update
Hyperledger: Market, Technology & Community Update
 
Practical Guide to Cloud Management Platforms
Practical Guide to Cloud Management PlatformsPractical Guide to Cloud Management Platforms
Practical Guide to Cloud Management Platforms
 
Cloud Customer Architecture for Blockchain
Cloud Customer Architecture for BlockchainCloud Customer Architecture for Blockchain
Cloud Customer Architecture for Blockchain
 
Cloud Foundry Road Map in 2017
Cloud Foundry Road Map in 2017Cloud Foundry Road Map in 2017
Cloud Foundry Road Map in 2017
 
Hyperledger: Advancing Blockchain Technology for Business
Hyperledger: Advancing Blockchain Technology for BusinessHyperledger: Advancing Blockchain Technology for Business
Hyperledger: Advancing Blockchain Technology for Business
 
Data Residency: Challenges and the Need for Standards
Data Residency: Challenges and the Need for StandardsData Residency: Challenges and the Need for Standards
Data Residency: Challenges and the Need for Standards
 
Cloud Customer Architecture for API Management
Cloud Customer Architecture for API ManagementCloud Customer Architecture for API Management
Cloud Customer Architecture for API Management
 
Cloud Customer Architecture for Enterprise Social Collaboration
Cloud Customer Architecture for Enterprise Social CollaborationCloud Customer Architecture for Enterprise Social Collaboration
Cloud Customer Architecture for Enterprise Social Collaboration
 
Cloud Foundry Roadmap in 2016
Cloud Foundry Roadmap in 2016Cloud Foundry Roadmap in 2016
Cloud Foundry Roadmap in 2016
 
Practical Guide to Platform-as-a-Service
Practical Guide to Platform-as-a-Service Practical Guide to Platform-as-a-Service
Practical Guide to Platform-as-a-Service
 
Practical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud ComputingPractical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud Computing
 
OASIS TOSCA: Cloud Portability and Lifecycle Management
OASIS TOSCA: Cloud Portability and Lifecycle ManagementOASIS TOSCA: Cloud Portability and Lifecycle Management
OASIS TOSCA: Cloud Portability and Lifecycle Management
 
Highlights of OpenStack Mitaka and the OpenStack Summit
Highlights of OpenStack Mitaka and the OpenStack SummitHighlights of OpenStack Mitaka and the OpenStack Summit
Highlights of OpenStack Mitaka and the OpenStack Summit
 

Dernier

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 

Dernier (20)

%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 

Latest Developments in Cloud Security Standards and Privacy

  • 1. 1 Latest Developments in Cloud Security Standards and Privacy http://www.cloud-council.org/deliverables/cloud-security-standards-what-to-expect- and-what-to-negotiate.htm November 17, 2016
  • 2. 2 Today’s Speakers Tracie Berardi Program Manager, Cloud Standards Customer Council Claude Baudoin Principal, cébé IT & Knowledge Management Energy Domain Consultant, OMG Mike Edwards Cloud Computing Standards Expert and Bluemix PaaS Evangelist, IBM Alexander Tumashov IT Cloud & Server Integration Manager, Schlumberger
  • 3. 3 The Cloud Standards Customer Council • Provide customer-led guidance to multiple cloud standards-defining bodies • Establishing criteria for open standards based cloud computing 650+ Organizations participating 2011/2012 Deliverables  Practical Guide to Cloud Computing  Practical Guide to Cloud SLAs  Security for Cloud Computing  Impact of Cloud on Healthcare 2013/2014 Deliverables  Convergence of SoMoClo  Analysis of Public Cloud SLAs  Cloud Security Standards  Migrating Apps to Public Cloud Services  Social Business in the Cloud  Big Data in the Cloud  Practical Guide to Cloud Computing V2  Migrating Apps: Performance Rqmnts  Cloud Interoperability/Portability http://cloud-council.org 2015 Deliverables  Web App Hosting Architecture  Mobile Cloud Architecture  Big Data Cloud Architecture  Security for Cloud Computing V2  Practical Guide to Cloud SLAs V2  Practical Guide to PaaS THE Customer’s Voice for Cloud Standards! 2016 Projects  Prac Guide to Hybrid Cloud Computing  Public Cloud Service Agreements, V2  Cloud Security Standards, V2  IoT Cloud Reference Architecture  Commerce Cloud Reference Architecture  More
  • 4. 4 What’s New in V2 ? • V1 was published in 2013 • Cloud security standards landscape has changed significantly • Increase in stringent laws and regulations relating to personally identifiable information (PII) in many countries • An example is the EU General Data Protection Regulation (GDPR) which applies to processing of PII of EU citizens • Cloud specific security standards are being more widely adopted • The paper has been updated to reflect these developments, highlighting standards like ISO/IEC 27018 & ISO/IEC 27017 and associated certifications
  • 5. 5 Cloud Security Standards: Benefits • Standards promote interoperability, reducing vendor lock-in • Standards facilitate hybrid cloud computing by making it easier to integrate on-premises security technologies with those of cloud service providers (CSPs) • Standards provide assurance that best practices are being followed both internally within an enterprise and by CSPs • Standards support provides an effective means by which cloud service customers can compare and contrast CSPs • Standards support enables an easier path to regulatory compliance
  • 6. 6 Standards Specifications  Define APIs and protocols  Extensibility - optional functions that go beyond those defined in standard  Formal certifications not provided - compliance and interoperability test suites may be available Examples OAuth 2.0, SAML 2.0, SSL/TLS, X.509 Cloud Security Standards: Current Landscape Advisory Standards  Interpreted and applied to all types and sizes of organizations  Flexibility: latitude to adopt information security controls that make sense to users  Unsuitable for compliance testing Examples ISO 27002, ISO 38500, COBIT Security Frameworks  Define specific policies, controls, checklists, procedures  Define processes for examining support - auditors use to assess & measure CSP conformance  Suitable for compliance testing Examples ISO/IEC 27001, ISO/IEC 27017, ISO/IEC 27018 Cloud security standards - maturing  Different types of standards need to be considered  Formal standards specific to cloud security already published General IT security standards applicable to cloud computing  Insist that cloud service providers support these Cloud service customers: insist on security certifications from providers  Cloud specific security certifications available today (emerging)  Existing general security certifications are applicable
  • 7. 7 Companion whitepaper: Security for Cloud Computing: 10 Steps to Ensure Success  A reference to help enterprise IT analyze security capabilities of CSPs  Available on CSCC Resource Hub: http://www.cloud-council.org/resource-hub 10 Steps to Evaluate Cloud Security 10 Steps to Evaluate Cloud Security 1. Ensure effective governance, risk & compliance 2. Audit operational & business processes 3. Manage people, roles & identities 4. Ensure proper protection of data & information 5. Enforce privacy policies 6. Assess the security provisions for cloud applications 7. Ensure cloud networks & connections are secure 8. Evaluate security controls on physical infrastructure & facilities 9. Manage security terms in the cloud service agreement 10. Understand the security requirements of the exit process
  • 8. 8 Step 1: Ensure effective governance, risk and compliance GRC Requirements  Cloud computing presents different risks than traditional IT solutions  Customers must understand their risk tolerance and must focus on mitigating the risks that are most crucial to the organization  Customers must fully understand specific laws or regulations that apply to the services (data retention, privacy requirements, etc.)  Customers should be notified if any breach occurs regardless if the customer is directly impacted  Primary means to ensure application and data security is through Cloud Service Agreement  General IT governance standards apply to cloud  Country & industry specific governance standards also apply CSF General IT Governance Standards Country / Industry Standards
  • 9. 9 Step 2: Audit operational & business processes Audit Requirements  Security audit of cloud service providers is essential  Security audits should be carried out by appropriately skilled staff  Security audits should leverage an established standard for security controls  Typically done as part of a formal certification process  Insist on ISO/IEC 27001 and ISO/IEC 27017 or equivalent certification  For cloud services with impact on financial activities seek SSAE 16 certification
  • 10. 10 Step 3: Manage people, roles & identities Considerations  Cloud service provider should support: • Federated identity management • Delegated user administration • Single sign-on • Strong, multi-factor, mutual and/or even biometric authentication • Role, entitlement and policy management • Identity & Access audit  Any access to the provider’s management platform should be monitored and logged  Several standards available for federated IDs, single sign-on and access control WS-Federation
  • 11. 11 Step 4: Ensure proper protection of data & information Considerations  Security considerations apply to data at rest as well as data in motion  Controls for securing data in the cloud: • Create a data asset catalog • Consider all forms of data • Consider privacy requirements • Apply confidentiality, integrity and availability principles • Apply identify and access management  Seek security standards for control framework, data in motion and data encryption KMIP Data Encryption Standards Data In Motion Standards Control Standards
  • 12. 12 Step 5: Enforce policies for Protection of Personal Data Considerations  “Privacy”: acquisition, storage, use of personally identifiable information (PII) • Gaining importance • Law and regulations usually apply  Privacy requirements include: • Limitations on use of and access to PII • Tagging PII data correctly • Securing storage of PII • Limiting access to authorized users  Specific types of PII require special treatment • Health data: HIPAA • Credit card data: PCI-DSS  Privacy issues should be addressed in CSA • ISO/IEC 19086 Cloud SLAs  Required controls specified in ISO/IEC 27018 EU-US Privacy Shield
  • 13. 13 Step 6: Assess the security provisions for cloud applications Considerations  Application security in cloud environment over complete lifecycle • Secure development, secure deployment (OWASP, ISO 27034) • Security testing (NIST 800-115)  Deployment model impacts application security • Infrastructure as a Service • Customer responsible for majority of security components • Platform as a Service • Provider responsible to provide secure operating system, middleware, network • Customer responsible for application security • Software as a Service • Provider provides application security • Customer must understand data encryption standards, audit capabilities, SLAs ISO 27034 Application Security SP 800-115
  • 14. 14 Step 7: Ensure cloud networks & connections are secure Considerations  Customer should gain assurance on provider’s internal and external network security  Areas of concern • Confidentiality Integrity Availability  External network requirements • Traffic screening • Intrusion detection / prevention • Logging and notification  Internal network requirements • Protect clients from each other • Protect the provider’s network • Monitor for intrusion attempts  ISO 27033 addresses network security  NIST 800-53 R4 has useful controls  FedRAMP specifies specific controls ISO 27033 Network Security
  • 15. 15 Considerations  Customer should gain assurance on provider’s physical security • Physical infrastructure & facilities should be in a secure area • Protection against external & environmental threats • Control of personnel in working areas • Equipment security controls • Controls on supporting utilities • Control security of cabling • Proper equipment maintenance • Removal & disposal of assets • Human resource security • DR & BC plans in place  Look for certification to ISO/IEC 27002 standard  ANSI TIA-942 covers physical security ISO 27002 Security Techniques: Code of Practice for Information Security Controls TIA-942 Step 8: Evaluate security controls on physical infrastructure & facilities
  • 16. 16 Considerations  Understand who is responsible for what (provider or customer)  CSA should specify that (and how) customer is notified of security incidents  CSA must also cover recovery measures and customer compensation  Security clauses in the CSA apply to cloud provider as well as its subcontractors  SLAs must include metrics for performance and effectiveness of information security management (see ISO/IEC 27004 and 19086, NIST 800-55 and CIS Consensus Metrics)  Data protection should follow ISO/IEC 27018  Require compliance reports to covering security controls, services and mechanisms  ISO/IEC 27017 specializes ISO/IEC 27002 to the cloud ISO/IEC 19086 ISO/IEC 27004 ISO/IEC 27017 ISO/IEC 27018 SP 800-55 CIS Consensus Metrics 1.1.0 Common Weakness Enumeration STAR Registry TR178 Step 9: Manage security terms in the cloud service agreement (CSA)
  • 17. 17 Step 10: Understand the security requirements of the exit process Considerations  Once termination process is complete, “the right to be forgotten” should be achieved  No customer data should reside with provider after the exit process  Require provider to cleanse log and audit data • Some jurisdictions may require retention of records of this type for specified periods by law  Exit process must allow customer a smooth transition without loss or breach of data  The emerging ISO/IEC 19086 standard contains language on the exit process ISO/IEC 19086 Cloud Computing – Service Level Agreement Framework
  • 18. 18 Cloud Security Certifications Certification  Means by which provider demonstrates conformance to standard / specification • Typically for specific services  Certificate typically issued via third-party auditor • Belongs to certification organization • Certification issued on regular basis  Certification organization in turn accredited by national body • Establish skill & procedure requirements for audits Relevant certifications  ISO/IEC 27001 & ISO/IEC 27017 (information security)  ISO/IEC 27018 (privacy)  TRUSTe Safe Harbor (privacy)
  • 19. 19 Recommendations  Expect CSP support for suitable standards  General governance • Use COBIT, ISO 20000, SSAE 16, ITIL  Information systems security • Use ISO 27017 & 27018  Federated IDs / SSO • Use widely accepted standards like LDAP, SAML 2.0, OAuth 2.0  Secure data in motion • Use HTTPS, SFTP, VPN  Encrypt static data • Follow FIPS 140-2 • Use KMIP to manage keys  Network Security • Use ISO 27033 & NIST SP 800-53  Certifications  ISO 27001  ISO 27017 or equivalent  For privacy, ISO/IEC 27018 or equivalent
  • 20. 20 • Join the CSCC Now! • To have an impact on customer use case based standards requirements • To learn about all Cloud Standards within one organization • To help define the CSCC’s future roadmap • Membership is free & easy: http://www.cloud-council.org/become- a-member • Get Involved! • Join one or more of the CSCC Working Groups • http://www.cloud-council.org/workinggroups • Leverage CSCC Collateral! • Visit http://www.cloud-council.org/resource-hub Call to Action