1 / 23

Cloud Security Challenges Today and Tomorrow

Cloud Security Challenges Today and Tomorrow. Name Title February 2011. Cloud: Dawn of a New Age. Cloud – overhyped in the short run, underestimated in the long term Compute becoming a utility Changes everything: business models, venture capital, R&D, ……. What is Cloud Computing?.

tab
Download Presentation

Cloud Security Challenges Today and Tomorrow

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cloud Security Challenges Today and Tomorrow • Name • Title • February 2011

  2. Cloud: Dawn of a New Age Cloud – overhyped in the short run, underestimated in the long term Compute becoming a utility Changes everything: business models, venture capital, R&D, ……

  3. What is Cloud Computing? Compute as a utility: third major era of computing Cloud enabled by Moore’s Law Hyperconnectivity SOA Provider scale Key characteristics Elastic & on-demand Multi-tenancy Metered service

  4. 2011-2014: the Hybrid Enterprise private clouds public clouds Extended Virtual Data Center enterprise boundary • Dispersal of applications • Dispersal of data • Dispersal of users • Dispersal of endpoint devices Notional organizational boundary cloud of users 4

  5. Cloud Forcing Key Issues Critical mass of separation between data owners and data processors Anonymity of geography of data centers & devices Anonymity of provider Transient provider relationships Physical controls must be replaced by virtual controls Identity management has a key role to play Cloud WILL drive change in the security status quo Reset button for security ecosystem

  6. Key Cloud Security Problems of Today From CSA Top Threats Research: Trust:Lack of Provider transparency, impacts Governance, Risk Management, Compliance Data: Leakage, Loss or Storage in unfriendly geography Insecure Cloud software Malicious use of Cloud services Account/Service Hijacking Malicious Insiders Cloud-specific attacks

  7. Key Problems of Tomorrow Globally incompatible legislation and policy Non-standard Private & Public clouds Lack of continuous Risk Mgt & Compliance monitoring Incomplete Identity Mgt implementations Haphazard response to security incidents

  8. Global, not-for-profit organization Over 17,000 individual members, 90 corporate members Building best practices and a trusted cloud ecosystem Agile philosophy, rapid development of applied research GRC: Balance compliance with risk management Reference models: build using existing standards Identity: a key foundation of a functioning cloud economy Champion interoperability Advocacy of prudent public policy “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.” About the Cloud Security Alliance

  9. Helpful research from CSA

  10. Popular best practices for securing cloud computing V2.1 released 12/2009 V3 target Q3 2011 wiki.cloudsecurityalliance.org/guidance CSA Guidance Research Cloud Architecture Governance and Enterprise Risk Management Legal and Electronic Discovery Governing the Cloud Compliance and Audit Information Lifecycle Management Portability and Interoperability Security, Bus. Cont,, and Disaster Recovery Data Center Operations Incident Response, Notification, Remediation Application Security Operating in the Cloud Encryption and Key Management Identity and Access Management Virtualization Guidance > 100k downloads: cloudsecurityalliance.org/guidance

  11. Sample Guidance - Governance Best opportunity to secure cloud engagement is before procurement – contracts, SLAs, architecture Know provider’s third parties, BCM/DR, financial viability, employee vetting Identify data location when possible Plan for provider termination & return of assets Preserve right to audit where possible Reinvest provider cost savings into due diligence

  12. Sample Guidance - Operating Encrypt data when possible, segregate key mgt from cloud provider Adapt secure software development lifecycle Understand provider’s patching, provisioning, protection Logging, data exfiltration, granular customer segregation Hardened VM images Assess provider IdM integration, e.g. SAML, OpenID

  13. Controls derived from guidance Rated as applicable to S-P-I Customer vs Provider role Mapped to ISO 27001, COBIT, PCI, HIPAA Help bridge the “cloud gap” for IT & IT auditors Cloud Controls Matrix Tool

  14. Research tools and processes to perform shared assessments of cloud providers Lightweight “common criteria” concept Integrated with Controls Matrix Ver 1 CAI Questionnaire released Oct 2010, approx 140 provider questions to identify presence of security controls or practices – use to assess cloud providers today Consensus Assessment Initiative

  15. Open standard and API to automate provider audit assertions Change audit from data gathering to data analysis Necessary to provide audit & assurance at the scale demanded by cloud providers Uses Cloud Controls Matrix as controls namespace Use to instrument cloud for continuous controls monitoring CloudAudit

  16. Suite of tools, best practices and enabling technology Consolidate industry research & simplify GRC in the cloud For cloud providers, enterprises, solution providers and audit/compliance Controls Framework, Questionnaire and Continuous Controls Monitoring Automation www.cloudsecurityalliance.org/grcstack CSA GRC Stack Provider Assertions Private & Public Clouds Control Requirements

  17. Only user certification for cloud security Web-based test for competency in CSA guidance $295 USD price www.cloudsecurityalliance.org/certifyme Training courses under development CCSK – Certificate of Cloud Security Knowledge

  18. Comprehensive Cloud Security Reference Architecture Secure & interoperable Identity in the cloud Getting SaaS, PaaS to be “Relying Parties” for corporate directories Scalable federation Outline responsibilities for Identity Providers Assemble reference architectures with existing standards Identity Mgt best practices whitepaper: http://www.cloudsecurityalliance.org/guidance/csaguide-dom12-v2.10.pdf Trusted Cloud Initiative

  19. Information assurance challenged by disruptive trends (cloud, mobility, social networking, etc) Cloud provides opportunity to rethink security (economics, architecture, service delivery models, etc) Fulfill 2nd half of mission statement: “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.” The need for the Security as a Service Initiative

  20. Information Security Industry Re-invented Define Security as a Service Articulate solution categories within Security as a Service Guidance for adoption of Security as a Service Align with other CSA research Develop deliverables as a proposed 14th domain within CSA Guidance version 3. Security as a Service Scope

  21. Consensus research for emergency response in Cloud Enhance community’s ability to respond to incidents Standardized processes Supplemental best practices for SIRTs Hosted Community of Cloud SIRTs www.cloudsecurityalliance.org/cloudsirt.html CloudSIRT

  22. Help us secure cloud computing www.cloudsecurityalliance.org info@cloudsecurityalliance.org LinkedIn: www.linkedin.com/groups?gid=1864210 Twitter: @cloudsa Contact

  23. Thank you!

More Related