SlideShare une entreprise Scribd logo
1  sur  20
Wednesday, 14
December 2016
Top Considerations for Business Leaders
1
Cloud Computing ?
The practice of using a network of remote
servers hosted on the Internet to store,
manage, and process data, rather than a
local server or a personal computer.
2
Risk ?
A probability or threat of damage, injury,
liability, loss, or any other negative
occurrence that is caused by external or
internal vulnerabilities, and that may be
avoided through pre-emptive action
(businessdictionary)
CASE WITH CLOUD COMPUTING
Benefits
3
4
What is Cloud Risk Management?
Known knowns,
known Unknowns,
&
Unknown Unknowns
all lurk around cloud
Computing.
5
Many Risk in Cloud
Computing
3 Problems to focus on
Risk 2 (R2)
Loss of
control over
high-value
information
Risk 3 (R3)
Overreliance
on cloud
service
providers
Risk 1 (R1)
Cloud
initiatives not
aligned with
business
strategies
6
R1 : Aligning Cloud Projects With Business Strategy
Top Management
Cloud
Initiatives
Should align
with Business
Strategies
Let’s
minimize risk
exposure and
deliver value
Let’s Specify the type
of Cloud services to
adopt based on our
enterprise goals , Risk
Tolerance and Risk
appetite
We need
cloud
computing
Let’s get a
Vendor to get us
what we decided
on
7
Management should not focus on Benefits
alone but :
Provide Adequate visibility of Associated risk,
Challenge the adequacy of risk measures against appetite and
business strategy.
8
Some Solutions to R1
 Cloud value proposition, traceable links to business strategy and how benefits will be
measured
 Top business risk and treatment strategies, i.e., data security, privacy laws, data location,
business resilience, regulatory compliance
 Proposed cloud deployment model: public, private or hybrid and associated risk
implications
 Planned cloud service delivery model: Software as a Service (SaaS), Platform as a Service
(PaaS) or Infrastructure as a Service (IaaS), and associated risk implications
 Service provider selection criteria, including financial viability, operational stability and
cybersecurity capabilities
 Plausible business disruption scenarios and recovery plans
 Service level agreements (SLAs), incident response and operational governance
 Third-party assurance, penetration testing, vulnerability assessments and right-to-audit
clauses
9
R2: Protecting High-value Information
(Security Matters)
Multitenancy
Benefit : Economy of scale and lower
service cost.
Issues : Vulnerability or misconfiguration
can lead to compromise across
multiple customers
Shared responsibilities
10
Some Solutions to R2
 Information classification (Identify High-value Information Assets and secure In
accordance to priority level)
 Store High level information in private cloud . This help eliminate Multitenacity
and shared responsibilities
11
Solutions to R2 continued
 Encryption (High-value information should be encrypted when hosted in the cloud to
minimise the risk of unauthorised disclosure).
 Note :
 Robust key management is essential because loosing of key may result into data loss
 Ensure cloud encryption service includes disaster recovery and failover capabilities to
minimise business impact if keys are lost
 Define responsibilities for managing encryption keys. Retain key management to mitigate
external breach of the service provider or malicious compromise by the service provider’s
privileged users.
 Test to confirm database encryption will not adversely impact application performance.
 Complement data encryption with integrity protections such as digital signatures to maintain
data authenticity.
12
13
Solution to R2 continued
 privileged access management (Deploy Strong Controls Over High-privileged
Access). Recommendations to achieve this are :
 Implement strong passwords and automate security policy provisioning.
 Enforce two-factor authentication and two-person rule over high-impact activities.
 Log and monitor access to privileged accounts, including execution of high-impact
commands.
 Retain superuser account credentials for accounts that give full access to all cloud
resources.
 Regularly rotate passwords for service accounts, using an automated password
management solution
14
R3: Overreliance on Cloud service providers15
Minimising Reliance on Cloud Service Providers
 Review the cloud service provider’s business continuity plan and disaster recovery plan
to determine if they meet the organisation’s recovery objectives.
 Utilise multiple cloud service providers to reduce risk of vendor lock-in.
 Implement high-availability cloud architecture to minimise service interruption.
 Complement the resilient architecture with regular backup and restore procedures, and
store backup data outside of the cloud provider premises.
 Update and test the organisation’s crisis management plan.
 Simulate recovery from different disaster scenarios, including recovery of individual
applications, virtual environments and the entire cloud service provider.
 To maintain business continuity and facilitate smooth transitions, organisations should
formulate exit strategies or contingency plans to migrate critical records to an alternate
solution, cloud or non-cloud.
16
Benefit of Cloud Risk Management
 Identifying possible Problems
 Provision of Measures to Prevent risk
 Ensuring Cloud initiatives align with organisational Goals
 Getting the best value from Cloud computing
 Providing measure to minimize the effect of Risk if they occur
 Boost the confidence of Adopting and sustaining cloud computing
17
Conclusion
 When properly planned, implemented and governed, the cloud can be
a major catalyst for process improvement as well as a driver of
business transformation. Cloud service providers are working
relentlessly to improve their security and resilience capabilities.
 In reality, an organisation’s onsite systems may not be more secure
than the cloud.
 Security and reliability risk may not outweigh the lost opportunity to
transform an enterprise with strategic use of the cloud.
 Cloud initiatives built upon enterprise strategy, coupled with robust risk
management processes, have the potential to accelerate business
innovation, transform customer experiences and improve competitive
advantage.
18
Presenter
Ibrahim Adeboye, Apena
19
Don’t be Shy to ask Questions or make
Contributions
Reference : http://www.isaca.org/Journal/archives/2016/volume-4/Pages/managing-cloud-risk.aspx
20

Contenu connexe

Tendances

Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Services
tsaiblake
 
How to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public cloudsHow to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public clouds
OK2OK
 
Security Consulting Methodology
Security Consulting MethodologySecurity Consulting Methodology
Security Consulting Methodology
ciso_insights
 
Clio Commercial Flyer 2012 R1
Clio Commercial Flyer 2012 R1Clio Commercial Flyer 2012 R1
Clio Commercial Flyer 2012 R1
Ian Horwood
 

Tendances (20)

Taking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityTaking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business Continuity
 
CLOUD-BASED BACKUP AND DISASTER RECOVERY. MANAGE. PROTECT. RECOVER
CLOUD-BASED BACKUP AND DISASTER RECOVERY. MANAGE. PROTECT. RECOVERCLOUD-BASED BACKUP AND DISASTER RECOVERY. MANAGE. PROTECT. RECOVER
CLOUD-BASED BACKUP AND DISASTER RECOVERY. MANAGE. PROTECT. RECOVER
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Services
 
How to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public cloudsHow to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public clouds
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
 
Security Consulting Methodology
Security Consulting MethodologySecurity Consulting Methodology
Security Consulting Methodology
 
Security Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident ResponseSecurity Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident Response
 
7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan
 
End Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoEnd Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and Cisco
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
 
Top 10 Cybersecurity Tips of 2022
Top 10 Cybersecurity Tips of 2022Top 10 Cybersecurity Tips of 2022
Top 10 Cybersecurity Tips of 2022
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security Presentation
 
Information Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeInformation Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data Safe
 
Global Cybersecurity Consulting Firm
Global Cybersecurity Consulting FirmGlobal Cybersecurity Consulting Firm
Global Cybersecurity Consulting Firm
 
Justifying Utility Security Investments
 Justifying Utility Security Investments Justifying Utility Security Investments
Justifying Utility Security Investments
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
 
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionLarry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
 
Clio Commercial Flyer 2012 R1
Clio Commercial Flyer 2012 R1Clio Commercial Flyer 2012 R1
Clio Commercial Flyer 2012 R1
 

En vedette

UN-Habitat Strategic Plan
UN-Habitat Strategic PlanUN-Habitat Strategic Plan
UN-Habitat Strategic Plan
John Hogan
 
December2016_McCraren_Transport
December2016_McCraren_TransportDecember2016_McCraren_Transport
December2016_McCraren_Transport
I. Zuzeth Zazueta
 
Instrument & Control Pictures
Instrument & Control Pictures Instrument & Control Pictures
Instrument & Control Pictures
mfkhroosa
 
Cuaderno electronico ( eduardo fernadez cervantes 2 a
Cuaderno electronico ( eduardo fernadez cervantes 2 aCuaderno electronico ( eduardo fernadez cervantes 2 a
Cuaderno electronico ( eduardo fernadez cervantes 2 a
Jorge Bautista
 

En vedette (12)

Disfunzione Mai Piu - Fabian Viatri
Disfunzione Mai Piu - Fabian ViatriDisfunzione Mai Piu - Fabian Viatri
Disfunzione Mai Piu - Fabian Viatri
 
portfolio - project2 - architecture
portfolio - project2 - architectureportfolio - project2 - architecture
portfolio - project2 - architecture
 
UN-Habitat Strategic Plan
UN-Habitat Strategic PlanUN-Habitat Strategic Plan
UN-Habitat Strategic Plan
 
Process Entropia
Process EntropiaProcess Entropia
Process Entropia
 
December2016_McCraren_Transport
December2016_McCraren_TransportDecember2016_McCraren_Transport
December2016_McCraren_Transport
 
Instrument & Control Pictures
Instrument & Control Pictures Instrument & Control Pictures
Instrument & Control Pictures
 
Shapeshifter Yoga - Kris Fondran
Shapeshifter Yoga - Kris FondranShapeshifter Yoga - Kris Fondran
Shapeshifter Yoga - Kris Fondran
 
Cuaderno electronico ( eduardo fernadez cervantes 2 a
Cuaderno electronico ( eduardo fernadez cervantes 2 aCuaderno electronico ( eduardo fernadez cervantes 2 a
Cuaderno electronico ( eduardo fernadez cervantes 2 a
 
URSA TECNebook - Isolamento controterra e sottofondazione con URSA XPS
URSA TECNebook - Isolamento controterra e sottofondazione con URSA XPSURSA TECNebook - Isolamento controterra e sottofondazione con URSA XPS
URSA TECNebook - Isolamento controterra e sottofondazione con URSA XPS
 
BrandInWest: Solberg
BrandInWest: SolbergBrandInWest: Solberg
BrandInWest: Solberg
 
ротаметр тип A
ротаметр тип Aротаметр тип A
ротаметр тип A
 
Site plan
Site planSite plan
Site plan
 

Similaire à Group reading assignments on managing cloud risk

Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
David Spinks
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
promediakw
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
Wayne Poggenpoel
 
benefits of cloud computing course
benefits   of   cloud  computing  coursebenefits   of   cloud  computing  course
benefits of cloud computing course
sndshkgowda
 
Cloud Strategy Methodology Visualisation
Cloud Strategy Methodology VisualisationCloud Strategy Methodology Visualisation
Cloud Strategy Methodology Visualisation
Gareth Llewellyn
 

Similaire à Group reading assignments on managing cloud risk (20)

Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
A Comprehensive Guide to Successful Cloud Migrations.pptx
A Comprehensive Guide to Successful Cloud Migrations.pptxA Comprehensive Guide to Successful Cloud Migrations.pptx
A Comprehensive Guide to Successful Cloud Migrations.pptx
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Cisco Powered DRaaS eBook
Cisco Powered DRaaS eBookCisco Powered DRaaS eBook
Cisco Powered DRaaS eBook
 
Hybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdfHybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdf
 
Cloud capability for startups
Cloud capability for startupsCloud capability for startups
Cloud capability for startups
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
 
Multi cloud Strategies Pros, Cons, and Best Practices.pdf
Multi cloud Strategies Pros, Cons, and Best Practices.pdfMulti cloud Strategies Pros, Cons, and Best Practices.pdf
Multi cloud Strategies Pros, Cons, and Best Practices.pdf
 
AWS Services 7 Transformation Media
AWS Services 7 Transformation MediaAWS Services 7 Transformation Media
AWS Services 7 Transformation Media
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
benefits of cloud computing course
benefits   of   cloud  computing  coursebenefits   of   cloud  computing  course
benefits of cloud computing course
 
The Hidden Risks of Cloud-Based Nonprofit Accounting Software
The Hidden Risks of Cloud-Based Nonprofit Accounting SoftwareThe Hidden Risks of Cloud-Based Nonprofit Accounting Software
The Hidden Risks of Cloud-Based Nonprofit Accounting Software
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
Cloud Strategy Methodology Visualisation
Cloud Strategy Methodology VisualisationCloud Strategy Methodology Visualisation
Cloud Strategy Methodology Visualisation
 
Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

Group reading assignments on managing cloud risk

  • 1. Wednesday, 14 December 2016 Top Considerations for Business Leaders 1
  • 2. Cloud Computing ? The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. 2 Risk ? A probability or threat of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal vulnerabilities, and that may be avoided through pre-emptive action (businessdictionary)
  • 3. CASE WITH CLOUD COMPUTING Benefits 3
  • 4. 4
  • 5. What is Cloud Risk Management? Known knowns, known Unknowns, & Unknown Unknowns all lurk around cloud Computing. 5
  • 6. Many Risk in Cloud Computing 3 Problems to focus on Risk 2 (R2) Loss of control over high-value information Risk 3 (R3) Overreliance on cloud service providers Risk 1 (R1) Cloud initiatives not aligned with business strategies 6
  • 7. R1 : Aligning Cloud Projects With Business Strategy Top Management Cloud Initiatives Should align with Business Strategies Let’s minimize risk exposure and deliver value Let’s Specify the type of Cloud services to adopt based on our enterprise goals , Risk Tolerance and Risk appetite We need cloud computing Let’s get a Vendor to get us what we decided on 7
  • 8. Management should not focus on Benefits alone but : Provide Adequate visibility of Associated risk, Challenge the adequacy of risk measures against appetite and business strategy. 8
  • 9. Some Solutions to R1  Cloud value proposition, traceable links to business strategy and how benefits will be measured  Top business risk and treatment strategies, i.e., data security, privacy laws, data location, business resilience, regulatory compliance  Proposed cloud deployment model: public, private or hybrid and associated risk implications  Planned cloud service delivery model: Software as a Service (SaaS), Platform as a Service (PaaS) or Infrastructure as a Service (IaaS), and associated risk implications  Service provider selection criteria, including financial viability, operational stability and cybersecurity capabilities  Plausible business disruption scenarios and recovery plans  Service level agreements (SLAs), incident response and operational governance  Third-party assurance, penetration testing, vulnerability assessments and right-to-audit clauses 9
  • 10. R2: Protecting High-value Information (Security Matters) Multitenancy Benefit : Economy of scale and lower service cost. Issues : Vulnerability or misconfiguration can lead to compromise across multiple customers Shared responsibilities 10
  • 11. Some Solutions to R2  Information classification (Identify High-value Information Assets and secure In accordance to priority level)  Store High level information in private cloud . This help eliminate Multitenacity and shared responsibilities 11
  • 12. Solutions to R2 continued  Encryption (High-value information should be encrypted when hosted in the cloud to minimise the risk of unauthorised disclosure).  Note :  Robust key management is essential because loosing of key may result into data loss  Ensure cloud encryption service includes disaster recovery and failover capabilities to minimise business impact if keys are lost  Define responsibilities for managing encryption keys. Retain key management to mitigate external breach of the service provider or malicious compromise by the service provider’s privileged users.  Test to confirm database encryption will not adversely impact application performance.  Complement data encryption with integrity protections such as digital signatures to maintain data authenticity. 12
  • 13. 13
  • 14. Solution to R2 continued  privileged access management (Deploy Strong Controls Over High-privileged Access). Recommendations to achieve this are :  Implement strong passwords and automate security policy provisioning.  Enforce two-factor authentication and two-person rule over high-impact activities.  Log and monitor access to privileged accounts, including execution of high-impact commands.  Retain superuser account credentials for accounts that give full access to all cloud resources.  Regularly rotate passwords for service accounts, using an automated password management solution 14
  • 15. R3: Overreliance on Cloud service providers15
  • 16. Minimising Reliance on Cloud Service Providers  Review the cloud service provider’s business continuity plan and disaster recovery plan to determine if they meet the organisation’s recovery objectives.  Utilise multiple cloud service providers to reduce risk of vendor lock-in.  Implement high-availability cloud architecture to minimise service interruption.  Complement the resilient architecture with regular backup and restore procedures, and store backup data outside of the cloud provider premises.  Update and test the organisation’s crisis management plan.  Simulate recovery from different disaster scenarios, including recovery of individual applications, virtual environments and the entire cloud service provider.  To maintain business continuity and facilitate smooth transitions, organisations should formulate exit strategies or contingency plans to migrate critical records to an alternate solution, cloud or non-cloud. 16
  • 17. Benefit of Cloud Risk Management  Identifying possible Problems  Provision of Measures to Prevent risk  Ensuring Cloud initiatives align with organisational Goals  Getting the best value from Cloud computing  Providing measure to minimize the effect of Risk if they occur  Boost the confidence of Adopting and sustaining cloud computing 17
  • 18. Conclusion  When properly planned, implemented and governed, the cloud can be a major catalyst for process improvement as well as a driver of business transformation. Cloud service providers are working relentlessly to improve their security and resilience capabilities.  In reality, an organisation’s onsite systems may not be more secure than the cloud.  Security and reliability risk may not outweigh the lost opportunity to transform an enterprise with strategic use of the cloud.  Cloud initiatives built upon enterprise strategy, coupled with robust risk management processes, have the potential to accelerate business innovation, transform customer experiences and improve competitive advantage. 18
  • 20. Don’t be Shy to ask Questions or make Contributions Reference : http://www.isaca.org/Journal/archives/2016/volume-4/Pages/managing-cloud-risk.aspx 20

Notes de l'éditeur

  1. A publication of International Data Corporation (IDC) forecasts worldwide use of public cloud growing at 19.4 percent annually over the next five years, early doubling from approximately US $70 billion in 2015 to more than US $141 billion in 2019. This is almost six times the growth of enterprise IT spending as a whole.