• Save
Rob livingstone Canberra Cloud Security Conference Nov 2011
Upcoming SlideShare
Loading in...5
×
 

Rob livingstone Canberra Cloud Security Conference Nov 2011

on

  • 492 views

Australian Security Government Strategies and considerations in Cloud computing: The speed of technological change associated with next generation networks is challenging traditional notions of what ...

Australian Security Government Strategies and considerations in Cloud computing: The speed of technological change associated with next generation networks is challenging traditional notions of what constitutes computer networks and how we should secure them. When it comes to the adoption of new technologies such as Cloud, Australian Federal government agencies face a set of challenges that are somewhat different to those faced in the commercial world. This primarily involves legislative and policy mandates for on-shore data residency, increased emphasis on jurisdictional risk, trans-border data transmission security and compliance with the Privacy Act and associated Principles. On the commercial side of the coin, Government agencies are also under constant budgetary restraints, and the potential for realising significant reductions in ICT costs, whilst improving data and information collaboration using cloud technologies is very real. Another key driver for Government is in achieving significant reduction in CO2 emissions from the current substantial ICT presence throughout all levels of Government by using virtualisation and cloud technologies. In this presentation, Rob will be providing some practical insights and offering guidance on how Federal Government can meet its legislative and other mandates and without compromising risk and security, by using cloud technologies in an appropriate and relevant manner.

Statistics

Views

Total Views
492
Views on SlideShare
492
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • (Read them out) So lets get started – by the way if you have questions at any time please feel free to raise your hand.
  • (Read them out) So lets get started – by the way if you have questions at any time please feel free to raise your hand.
  • (Read them out) So lets get started – by the way if you have questions at any time please feel free to raise your hand.

Rob livingstone Canberra Cloud Security Conference Nov 2011 Rob livingstone Canberra Cloud Security Conference Nov 2011 Presentation Transcript

  •  
  • Cloud Computing Security Considerations in Federal Government Today Rob Livingstone • Principal
  • What I’ll be covering:
    • G-Clouds: Current international landscape
    • Australian G-Clouds
    • The 4 flavours of Cloud computing – security and risk considerations
    • Cloud – Getting the security-risk-benefit balance right
    • The death of Public Cloud – Security? What security?
    • Key risk considerations in moving to the cloud
    • Governments: The case for community or hybrid G-cloud
    • The future is now
    • Questions and discussion
    Government Cloud computing, or the G-Cloud:
  • 1. G-Clouds: Current international landscape Much activity across all governments and agencies, globally
    • All governments, worldwide, are coming to grips with Cloud.
    • Rapidly maturing appreciation for security, risk and other factors in cloud computing for both public and private sectors
      • US Federal and State governments do not face the risks associated with international jurisdictional issues, as most cloud providers are US corporations
    • Consensus is to:
      • Proceed cautiously and with deliberation
      • Test on the edge, or with non-core applications
    1. G-Clouds: Current international landscape Much activity across all governments and agencies, globally
  • 2. Australian G-Clouds
    • Australian Government Data Centre Strategy 2010-2025 is a cornerstone for data centre consolidation, however it makes no explicit reference to, or associations with, cloud technologies.
    • The Data Centre as a Service (DCaaS) supplier submissions commencing 30th November, imply future cloud capabilities, but not explicitly stated
    • The data centre  cloud association should be stated:
      • All cloud technologies are absolutely dependent on data centre strategies , and in particular data centre consolidation
      • An integrated view is recommended to avoid missed opportunities, and consistently manage risks and security at the national, ‘whole of government’ level
    • Intergovernmental collaboration – security considerations:
    • Are State Governments and Territories to be included in a national cloud or data centre agenda in any way?
    • Benefits of aligning DCaaS, PaaS, IaaS strategies across all governments will:
      • Provide Federal, State and local governments with a consistent security and risk (discovery, assessment and mitigation) frameworks
      • Allow for improved inter ICT agency collaboration in the setting of security and risk policies and mitigation procedures at all levels of government, nationally
    • Is this a missed opportunity for Australia as a whole?
    2. Australian G-Clouds
  • 3. The 4 flavours of cloud computing and their relevance for Governments – basic attributes Public
    • No control
    • No ownership
    • You own data
    • Apps stay behind
    • You control all
    • You may own
    • You define architecture
    • You determine your own security position
    • Combination of 2 or more models
    • Can be more complex
    • Need to manage interfaces, integration
    Private Hybrid Community
    • Multiple business units or agencies share same private cloud infrastructure
  • Public Private Hybrid Community
    • No control over security and risk profile
    • Vulnerabilities identified
    • Recent outages – reliability?
    • You control security posture and counter-measures
    • You manage and mitigate risks
    • Maximum flexibility
    • Increases complexity of managing identities, security and risk, hence cost
    • Allows for standardisation of risk and security systems and policies
    • Concentrates the risk of a security breach
    3. The 4 flavours of cloud computing and their relevance for Governments – risk and security considerations G-Clouds
    • Benefits
    •  IT cost
    • IT Project timelines
    • IT Complexity
    •  Project speed
    •  Energy / CO 2
    • Issues & Considerations
    • Risk & Security tolerance
    • Existing infrastructure
    • Regulatory mandates
    • Legislation
    • Policy restrictions
    4. Cloud – Getting the security-risk-benefit balance right G-Cloud: Is this achievable using public cloud technologies?
  • Private Sector Governments
    • Private sector has, generally….
      • Fewer layers of mandated governance
      • Ability to dynamically trade off risk and security with promise of greater profitability
      • Due diligence and compliance seen as a impost to be minimised
      • Accountability to shareholders, and not the public at large
    • Private sector is therefore more able to dial up the appetite for risk.
    • Can therefore be more aggressive adopters of Cloud technologies
    4. Cloud – Getting the security-risk-benefit balance right
  • The Public Cloud security and risk paradox
    • One of the fundamental benefits of public cloud is the removal of IT complexity.
    • It’s invisible to the end user.
    • Paradoxically, this presents those organisations concerned about IT security, risk and governance with a challenge because lack of visibility of what’s ‘under the covers’ may present unacceptable risks if fully disclosed and understood.
    • Let’s look at 3 recent security reports involving public Cloud.
    5. Death of Public G-Cloud – Security? What security?
  • http://trust.cased.de/AMID Security Vulnerabilities in public cloud -- #1 5. Death of Public G-Cloud – Security? What security?
  • A team of researchers * from Germany's Ruhr University of Bochum reveal cloud security vulnerabilities in common public cloud platforms …. Security Vulnerabilities in public cloud -- #2 * Presented at 18th ACM Conference on Computer and Communications Security, October 21, 2011, Chicago, USA 5. Death of Public G-Cloud – Security? What security?
  • Security Vulnerabilities in public cloud -- #3 http://www.rogerclarke.com/EC/CCC.html 5. Death of Public G-Cloud – Security? What security?
    • G-Cloud and jurisdictional security considerations
    • Identity management and access control
    • The concentration of risk through consolidation
    • Agility Risk
    • Dealing with legacy systems
    • Staff and contractor risk considerations
    • Network carriage security risks
    6. Key risk and security considerations in moving to the cloud
    • a) G-Cloud and Jurisdictional security considerations
    • Department of Defence specifies jurisdictional
    • controls (0873 and 1073)
    • Default position being on-shore data location
    • Physical and legislative jurisdictions are separate
    • considerations:
    • Hosting G-Cloud in an Australian data centre owned
    • by an Australian registered business but a controlling
    • interest by a US firm , may be subject to legislation under the US Patriot Act
    • Other countries (Russia, China, Singapore, etc) have similar laws of investigation or seizure without cause
    • This may pose an unacceptable security risk for Australian Governments
    6. Key risk and security considerations in moving to the cloud
    • b) Identity management and access control
      • Core and critical to any cloud implementation
      • Utmost due diligence is required in the design, implementation, governance and ongoing management of all systems handing digital identities, access controls and related security credentials
      • Do not place your credential management system in the public cloud
      • Complexity of managing identities and access controls rises exponentially with the number of systems requiring integration
    6. Key risk and security considerations in moving to the cloud
    • c) Concentration of risk:
      • Consolidation of data centres, applications (cloud or otherwise), and critical ICT Infrastructure has potential for concentrating the risk of any adverse security event
      • Any failure at the infrastructure core could bring down multiple nationwide services concurrently.
      • A breach of security at the perimeter (hack, intrusion, etc) could jeopardise the entire infrastructure
      • The system administrators responsibilities are further concentrated into a few key staff, and the countermeasures against malicious damages by disgruntled employees, (or social engineering attacks) needs to be robust and systemically effective
    6. Key risk and security considerations in moving to the cloud
    • d) Agility Risk :
      • The entire cloud stack must be agile enough to keep pace with changes in usage demands, legislation or new industry standards.
      • Due to the standardised nature of SaaS offerings, local customisations may be problematic, which increases the risks associated with management of concurrent multiple versions of software
    • e) Dealing with legacy systems
      • Governments at all levels have significant legacy infrastructure at all levels, from data centres through to applications.
      • Integrating new cloud services with existing legacy environments increases the complexity of an implementation. With this complexity, comes the added risks of error in change control, for example.
    6. Key risk and security considerations in moving to the cloud
    • Staff and contractor risk considerations
      • Changes to IT Department’s structures and staff skills mix will invariably be needed to effectively support G-Cloud initiatives
      • Transitioning and upskilling staff into doing new and different tasks, can increase the error rate in designing, maintaining and managing all ICT infrastructure
    • Network carriage security risks
      • The much publicised, deep and extensive hack earlier this year of the NBN by a self taught unemployed truck driver living in regional NSW, underlies the importance of being vigilant for attacks at the network and transport layer.
      • Trusted private networks should be the default position
    6. Key risk and security considerations in moving to the cloud
    • The G-Cloud concept has the potential to enable significant savings, as it provides an access point for ICT services, applications and assets.
    • Agencies can source capacity on an ‘on demand’ basis, avoiding the costs and delays involved in purchasing and running their own IT infrastructure.
    • The hosting of government applications and websites can be undertaken strategically, rather than individually implemented using multiple third parties.
    • The G-Cloud has the potential to reduce energy consumption, by consolidation of existing ICT hardware – reducing the number of data centres and associated infrastructure.
    • Will government agencies ‘trust’ a centralised cloud provider?
      • ie: They know better and can do a better job!
    7. Governments: The case for community or hybrid G-cloud
  • 8. Cloud – The future is now
    • Cloud technology, as with any other innovation, has the potential to do things cheaper, faster and better.
    • For governments at all levels: The use of public clouds for anything other than information that is to be placed in the public domain should be questioned
    • Exposure to international jurisdictional issues needs careful consideration in any G-cloud
      • In particular those that are resident overseas or
      • Have a local presence, but with a direct or indirect controlling foreign interest
    • The cloud marketplace is volatile, full of conflicting messages, and compelling offers
    • Rigorous due diligence is called for and independence of opinion from experts that have no financial interests in the outcome should be sought to act at the ‘canary in the coalmine’
    • Rob Livingstone,
    • Principal, Rob Livingstone Advisory Pty Ltd
    • Fellow, University of Technology (Sydney)
    • W1: www.rob-livingstone.com
    • W2: www.navigatingthroughthecloud.com
    • E: [email_address]
    • P: +61 2 8005 1972
    • P: +1 609 843 0349
    • M : +61 419 632 673
    • F: +61 2 9879 5004
    • rladvisory
    • © All rights reserved. Unauthorised redistribution not without prior approval
    9. Discussions and questions