SlideShare a Scribd company logo
1 of 23
Download to read offline
Privacy
Issues
in
the
Cloud

    Presenta4on
to
the
Chief
Privacy
Officers
Council


    Constan4ne
Karbalio4s

    Data
Protec*on
&
Privacy
Lead


May
4,
2010
                                           1

Agenda

           1
       Introduc*on


           2
       What
is
the
Cloud?


           3
       What
do
Security
Professionals
See
as
Risks?


           4
       What
are
the
Privacy
Issues?


           5
       What
is
the
Real
Problem?


          6
        Conclusion/Q&A

                                                                    2

Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s

What
is
the
Cloud?




Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
   3

What
is
“the
Cloud”?

• “Cloud
compu*ng”
defini*ons:

    – Cloud
compu*ng
is
interconnected
networks
of
IT
enabled

      resources
(i.e.
services)
delivered
in
a
dynamically
scalable

      and
virtualized
method,
made
available
to
customers
for

      purchase
via
variable
cost
models
based
on
usage.

        •  Symantec


    – just
as
with
a
u*lity,
enterprises
can
pay
for
informa*on

      technology
services
on
a
consump*on
basis





Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                   4

Benefits
and
Risks

Accelera4ng
Trend

  –  Growing
market
to
reach
$42
billion
by
2012
‐
IDC

Rewards

   –  Takes
advantage
of
virtualiza*on


   –  Provides
on‐demand
services
for
easy
scalability

   –  Minimizes
capital
and
opera*ng
costs
expenditures

   –  Provides
access
to
exper*se
not
available
in‐house

   –  Enhances
business
agility


Risks

    –  Current
lack
of
standardiza*on

    –  Rela*vely
high
switching
costs
for
proprietary
solu*ons

    –  Security
and
Privacy



Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
              5

                                                                       5
What
do
Security
Professionals
See
as

    Risks?




Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
   6

Top
Security
Threats
to
Cloud
Compu4ng

•  Abuse
and
Nefarious
Use
of
Cloud
Compu*ng

•  Insecure
Applica*on
Programming
Interfaces

•  Malicious
Insiders

•  Shared
Technology
Vulnerabili*es

•  Data
Loss/Leakage

•  Account,
Service
&
Traffic
Hijacking

•  Unknown
Risk
Profile



•    Source:


        Top
Threats
to
Cloud
Compu*ng,
Version
1.0

        Cloud
Security
Alliance

        hbp://www.cloudsecurityalliance.org/topthreats



 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
     7

Governance
Concerns

PERCEIVED
RISKS
IN
CLOUD
COMPUTING


Uncertain
ability
to
enforce
security
                      23
percent


policies
at
a
provider


Inadequate
training
and
IT
audi*ng
                    

   22
percent
    


Ques*onable
privileged
access
control
at
                   14
percent     


provider
site
    


Uncertain
ability
to
recover
data                      

   12
percent
    


Proximity
of
data
to
another
customer’s

                   11
percent


Uncertain
ability
to
audit
provider
                   

   10
percent
    


Uncertain
con*nued
existence
of
provider

 4
percent
                      


Uncertain
provider
regulatory
compliance

 4
percent



               Source:
Price
Waterhouse
Cooper/CISO‐CIO
Magazine
Survey,
2010



Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                             8

What
are
the
Privacy
Risks?




Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
   9

Privacy
Risks
with
Cloud
Compu4ng

  •  Certain
types
of
data
may
trigger
specific

     obliga*ons
under
na*onal
or
local
law

  •  Vendor
issues:


       –  Organiza*ons
may
be
unaware
they
are
even
using

          cloud‐based
vendors

       –  Due
diligence
s*ll
required
as
in
any
vendor
rela*onship

       –  Data
security
is
s*ll
the
responsibility
of
the
customer

       –  Service
Level
agreements
need
to
account
for
access,

          correc*on
and
privacy
rights

  •    Data
Transfer:

       –    Cloud
models
may
trigger
interna*onal
legal
data

            transfer
requirements

                      Source:
Hunton
&
Williams,
“Outsourcing
to
the
cloud:
data
security
and

                      privacy
risks”,
March
15,
2010

Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                                             10

What
is
the
Real
Problem?




Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
   11

Ponemon
Study
for
Symantec:
Summary

•  Business
applica*ons,
solu*on
stacks
and
storage
are
the
most
popular
cloud

   compu*ng
applica*ons,
plaiorms
and
infrastructure
services

•  Few
organiza*ons
take
proac*ve
steps
to
protect
both
their
own
sensi*ve

   business
informa*on
and
that
of
their
customers,
consumers
and
employees

   when
they
store
that
informa*on
with
cloud
compu*ng
vendors

•  Organiza*ons
are
adop*ng
cloud
technologies
without
the
usual
vekng

   procedures

•  Employees
are
making
decisions
without
their
IT
departments’
insights
or
full

   knowledge
of
the
security
risks
involved

•  Two
years
from
now,
most
respondents
plan
to
use
cloud
compu*ng
much

   more
intensively
than
they
do
today

•  Yet
even
as
momentum
for
cloud
compu*ng
builds,
doubts
about
security

   difficul*es
of
cloud
compu*ng
persist

•  Organiza*ons
most
frequently
protect
themselves
through
tradi*onal
IT

   security
solu*ons
and
legal
or
indemnifica*on
agreements
with
vendors.


Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                           12

Ponemon
Study
finds
Fewer
than
One
in
Ten
Companies

Evaluate
Vendors
or
Train
Employees
on
Cloud
Security:

   •  More
than
75
percent
of
respondents
noted
that
the
migra*on
to

      cloud
compu*ng
was
occurring
in
a
less‐than
ideal
manner,
due

      to
a
lack
of
control
over
end
users

   •  Only
27
percent
of
respondents
said
their
organiza*ons
have

      procedures
for
approving
cloud
applica*ons
that
use
sensi*ve
or

      confiden*al
informa*on

   •  68
percent
indicated
that
ownership
for
evalua*ng
cloud

      compu*ng
vendors
resides
with
end
users
and
business
managers

   •  Only
20
percent
of
the
organiza*ons
surveyed
reported
that
their

      informa*on
security
teams
are
regularly
involved
in
the
decision

      making
process
and
approximately
a
quarter
said
they
never

      par*cipated
at
all

   •  69
percent
of
the
respondents
indicated
they
would
prefer
to
see

      the
informa*on
security
or
corporate
IT
teams
lead
the
cloud

      decision
making
process


Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                      13

Policy
and
Procedural
Gaps





                      Source:
Ponemon
Ins*tute
study
for
Symantec:
“Flying
Blind
in
the
Cloud”,

                      April
7,
2010

Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                                               14

Ineffec4ve
Review





Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
   15

Cloud
Compu4ng
Vendors
Review
“Process”





                      Source:
Ponemon
Ins*tute
study
for
Symantec:
“Flying
Blind
in
the
Cloud”,

                      April
7,
2010

Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                                               16

Organiza4onal
steps
to
ensure
data
protec4on





                      Source:
Ponemon
Ins*tute
study
for
Symantec:
“Flying
Blind
in
the
Cloud”,

                      April
7,
2010

Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                                               17

Conclusion/Q&A




Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
   18

Managing
Privacy
in
the
Cloud

•  Policies
and
procedures
must
explicitly
address
cloud
privacy

   risks

•  Informa*on
governance
must
be
put
in
place
that:

    –  Provides
tools
and
procedures
for
classifying
informa*on
and
assessing
risk


    –  Establish
policies
for
cloud‐based
processing
based
upon
risk
and
value
of

       asset.


•  Evaluate
third
par*es’
security
and
privacy
capabili*es
before

   sharing
confiden*al
or
sensi*ve
informa*on.


    –  Thorough
review
and
audit
of
vendors

    –  Independent
third
party
verifica*on


•  Train
employees
and
staff
accordingly
to
mi*gate
security/
   privacy
risks
in
cloud
compu*ng

    –  Address
from
mul*‐departmental
perspec*ve

Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                             19

Model
for
Managing
Cloud
Risks
‐
Governance

•  Strategy:

    –  What
kinds
of
data
will
you
as
a
maber
of
course
not
allow
to
go
to
the

       cloud?
What
kind
of
cloud
is
appropriate
for
certain
types
of
data?

    –  Implicit:
you
have
a
data
classifica*on
system
that
you
follow
and
know

       the
value
of
your
data
assets

•  Educa*on
&
training

    –  Train
users/business
units
that
this
requires
vendor
review
just
as
any

       other
vendor

•  Resources
&
Ownership

    –  Academic
to
have
nice
policies,
contractual
language
permikng
audit

       rights,
if
you
don’t
have
staff
to
do
it

    –  Everyone
wants
Informa*on
Security
or
IT
to
own
this
–
equip
them


Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                              20

Model
for
Managing
Cloud
Risks
–
Formal
Risk

Management

•  Privacy
Risk/Impact
Assessment

    –  Document
ownership
of
risks,
mi*ga*ons

•  Data
Flow
Diagram

    –  Iden*fy
types
of
PII
in
flow,
as
well
as
what
systems,
en**es
and

       jurisdic*ons
that
data
flows
through

•  Security
Assessments
&
Measures

    –  Appropriate
measures
to
ensure
adequate
applica*on
security,

       development
processes
and
penetra*on/vulnerability
tes*ng

    –  Require
regular
tes*ng
as
well
as
at
outset
of
rela*onship

    –  Consider
strategies
based
on
encryp*on,
data
obfusca*on






Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                       21

Model
for
Managing
Cloud
Risks
–
Contract
&
Audit

•  Legal
Models

    –  Develop
appropriate
contractual
terms
to
ensure
protec*on
of
the
types
of

       data
you
want
to
process:

        •  Records
reten4on
&
lawful
access

        •  Access

        •  Data
sharing
risks/commingling

        •  Jurisdic4onal
risks

        •  Flow‐down
of
requirements
for
security,
audit,
evidence
of
compliance
for
sub‐contractors

    –  Revisit/revise
customer
privacy
no*ces,
agreements:
do
they
reflect
what
you

       are
doing
with
the
data?


•  Monitoring

    –  Ensure
that
there
are
mechanisms
technical
and
organiza*onal
to
assess
and

       audit
cloud
vendor’s
use
of
data

•  Audit
and
Third
Party
Cer*fica*on

    –  Ensure
you
have
the
ability
to
audit
–
and
do
it

    –  Third
party
cer*fica*ons
as
a
minimum


Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                                                    22

Thank
you!

    Constan*ne
Karbalio*s,
J.D.,
CIPP/C/IT

    constan*ne_karbalio*s@symantec.com

    416.402.9873



    Copyright
©
2010
Symantec
Corpora4on.
All
rights
reserved.
Symantec
and
the
Symantec
Logo
are
trademarks
or
registered
trademarks
of
Symantec
Corpora*on
or
its
affiliates
in

    the
U.S.
and
other
countries.

Other
names
may
be
trademarks
of
their
respec*ve
owners.


    This
document
is
provided
for
informa*onal
purposes
only
and
is
not
intended
as
adver*sing.

All
warran*es
rela*ng
to
the
informa*on
in
this
document,
either
express
or
implied,

    are
disclaimed
to
the
maximum
extent
allowed
by
law.

The
informa*on
in
this
document
is
subject
to
change
without
no*ce.



Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                                                                                                                                     23


More Related Content

What's hot

Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
Ahmed Nour
 
Load Balancing In Cloud Computing newppt
Load Balancing In Cloud Computing newpptLoad Balancing In Cloud Computing newppt
Load Balancing In Cloud Computing newppt
Utshab Saha
 

What's hot (20)

basic concept of Cloud computing and its architecture
basic concept of Cloud computing  and its architecturebasic concept of Cloud computing  and its architecture
basic concept of Cloud computing and its architecture
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service models
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Seven step model of migration into the cloud
Seven step model of migration into the cloudSeven step model of migration into the cloud
Seven step model of migration into the cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
Benefits of Cloud Computing
Benefits of Cloud ComputingBenefits of Cloud Computing
Benefits of Cloud Computing
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Unit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureUnit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing Architecture
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
Load Balancing In Cloud Computing newppt
Load Balancing In Cloud Computing newpptLoad Balancing In Cloud Computing newppt
Load Balancing In Cloud Computing newppt
 
Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Viewers also liked (6)

Cloud Computing: The Hard Problems Never Go Away
Cloud Computing: The Hard Problems Never Go AwayCloud Computing: The Hard Problems Never Go Away
Cloud Computing: The Hard Problems Never Go Away
 
Analytics Store for Hybrid Cloud
Analytics Store for Hybrid CloudAnalytics Store for Hybrid Cloud
Analytics Store for Hybrid Cloud
 
Lotusphere 2011, BP106: "Where is the Love? How to get your users to fall in ...
Lotusphere 2011, BP106: "Where is the Love? How to get your users to fall in ...Lotusphere 2011, BP106: "Where is the Love? How to get your users to fall in ...
Lotusphere 2011, BP106: "Where is the Love? How to get your users to fall in ...
 
Cloud Computing Security Needs & Problems Alon Refaeli
Cloud Computing Security Needs & Problems   Alon RefaeliCloud Computing Security Needs & Problems   Alon Refaeli
Cloud Computing Security Needs & Problems Alon Refaeli
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Canadian Response to the Draft EU Regulation - May 2013
Canadian Response to the Draft EU Regulation - May 2013Canadian Response to the Draft EU Regulation - May 2013
Canadian Response to the Draft EU Regulation - May 2013
 

Similar to Privacy issues in the cloud

Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Joanna Hendricks
 
Cloud and challenges isacakenya
Cloud and challenges   isacakenyaCloud and challenges   isacakenya
Cloud and challenges isacakenya
Tonny Omwansa
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
promediakw
 
Itmgen 4317 security
Itmgen 4317 securityItmgen 4317 security
Itmgen 4317 security
Cisco
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
Matthew Moldvan
 
Cloud complete
Cloud completeCloud complete
Cloud complete
Navriti
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
David Spinks
 

Similar to Privacy issues in the cloud (20)

Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580
 
Cloud and challenges isacakenya
Cloud and challenges   isacakenyaCloud and challenges   isacakenya
Cloud and challenges isacakenya
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
 
Cloud complete
Cloud completeCloud complete
Cloud complete
 
cloud-complete power point presentation for digital signature
cloud-complete power point presentation for digital signaturecloud-complete power point presentation for digital signature
cloud-complete power point presentation for digital signature
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
 
Itmgen 4317 security
Itmgen 4317 securityItmgen 4317 security
Itmgen 4317 security
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing Risks
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
 
Cloud complete
Cloud completeCloud complete
Cloud complete
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
 
3.pptx
3.pptx3.pptx
3.pptx
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Issue identification cloud computing
Issue identification cloud computingIssue identification cloud computing
Issue identification cloud computing
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptx
 

More from Constantine Karbaliotis

Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Constantine Karbaliotis
 

More from Constantine Karbaliotis (8)

Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
 
The Value of Personal Information - IAPP Canada 2011
The Value of Personal Information - IAPP Canada 2011The Value of Personal Information - IAPP Canada 2011
The Value of Personal Information - IAPP Canada 2011
 
International Perspectives on Data Breach
International Perspectives on Data BreachInternational Perspectives on Data Breach
International Perspectives on Data Breach
 
Update on enterprise social media risks
Update on enterprise social media risks Update on enterprise social media risks
Update on enterprise social media risks
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
Privacy Access Letter I Feb 5 07
Privacy Access Letter I   Feb 5 07Privacy Access Letter I   Feb 5 07
Privacy Access Letter I Feb 5 07
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Privacy issues in the cloud

  • 1. Privacy
Issues
in
the
Cloud
 Presenta4on
to
the
Chief
Privacy
Officers
Council
 Constan4ne
Karbalio4s
 Data
Protec*on
&
Privacy
Lead
 May
4,
2010
 1

  • 2. Agenda
 1
 Introduc*on
 2
 What
is
the
Cloud?
 3
 What
do
Security
Professionals
See
as
Risks?
 4
 What
are
the
Privacy
Issues?
 5
 What
is
the
Real
Problem?
 6
 Conclusion/Q&A
 2
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s

  • 4. What
is
“the
Cloud”?
 • “Cloud
compu*ng”
defini*ons:
 – Cloud
compu*ng
is
interconnected
networks
of
IT
enabled
 resources
(i.e.
services)
delivered
in
a
dynamically
scalable
 and
virtualized
method,
made
available
to
customers
for
 purchase
via
variable
cost
models
based
on
usage.
 •  Symantec
 – just
as
with
a
u*lity,
enterprises
can
pay
for
informa*on
 technology
services
on
a
consump*on
basis
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 4

  • 5. Benefits
and
Risks
 Accelera4ng
Trend
 –  Growing
market
to
reach
$42
billion
by
2012
‐
IDC
 Rewards
 –  Takes
advantage
of
virtualiza*on

 –  Provides
on‐demand
services
for
easy
scalability
 –  Minimizes
capital
and
opera*ng
costs
expenditures
 –  Provides
access
to
exper*se
not
available
in‐house
 –  Enhances
business
agility

 Risks
 –  Current
lack
of
standardiza*on
 –  Rela*vely
high
switching
costs
for
proprietary
solu*ons
 –  Security
and
Privacy
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 5
 5
  • 6. What
do
Security
Professionals
See
as
 Risks?
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 6

  • 7. Top
Security
Threats
to
Cloud
Compu4ng
 •  Abuse
and
Nefarious
Use
of
Cloud
Compu*ng
 •  Insecure
Applica*on
Programming
Interfaces
 •  Malicious
Insiders
 •  Shared
Technology
Vulnerabili*es
 •  Data
Loss/Leakage
 •  Account,
Service
&
Traffic
Hijacking
 •  Unknown
Risk
Profile
 •  Source:

 Top
Threats
to
Cloud
Compu*ng,
Version
1.0
 Cloud
Security
Alliance
 hbp://www.cloudsecurityalliance.org/topthreats
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 7

  • 8. Governance
Concerns
 PERCEIVED
RISKS
IN
CLOUD
COMPUTING

 Uncertain
ability
to
enforce
security
 23
percent

 policies
at
a
provider

 Inadequate
training
and
IT
audi*ng
 

 22
percent
 

 Ques*onable
privileged
access
control
at
 14
percent 

 provider
site
 

 Uncertain
ability
to
recover
data 

 12
percent
 

 Proximity
of
data
to
another
customer’s

 11
percent

 Uncertain
ability
to
audit
provider
 

 10
percent
 

 Uncertain
con*nued
existence
of
provider

 4
percent
 

 Uncertain
provider
regulatory
compliance

 4
percent

 Source:
Price
Waterhouse
Cooper/CISO‐CIO
Magazine
Survey,
2010
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 8

  • 10. Privacy
Risks
with
Cloud
Compu4ng
 •  Certain
types
of
data
may
trigger
specific
 obliga*ons
under
na*onal
or
local
law
 •  Vendor
issues:

 –  Organiza*ons
may
be
unaware
they
are
even
using
 cloud‐based
vendors
 –  Due
diligence
s*ll
required
as
in
any
vendor
rela*onship
 –  Data
security
is
s*ll
the
responsibility
of
the
customer
 –  Service
Level
agreements
need
to
account
for
access,
 correc*on
and
privacy
rights
 •  Data
Transfer:
 –  Cloud
models
may
trigger
interna*onal
legal
data
 transfer
requirements
 Source:
Hunton
&
Williams,
“Outsourcing
to
the
cloud:
data
security
and
 privacy
risks”,
March
15,
2010
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 10

  • 12. Ponemon
Study
for
Symantec:
Summary
 •  Business
applica*ons,
solu*on
stacks
and
storage
are
the
most
popular
cloud
 compu*ng
applica*ons,
plaiorms
and
infrastructure
services
 •  Few
organiza*ons
take
proac*ve
steps
to
protect
both
their
own
sensi*ve
 business
informa*on
and
that
of
their
customers,
consumers
and
employees
 when
they
store
that
informa*on
with
cloud
compu*ng
vendors
 •  Organiza*ons
are
adop*ng
cloud
technologies
without
the
usual
vekng
 procedures
 •  Employees
are
making
decisions
without
their
IT
departments’
insights
or
full
 knowledge
of
the
security
risks
involved
 •  Two
years
from
now,
most
respondents
plan
to
use
cloud
compu*ng
much
 more
intensively
than
they
do
today
 •  Yet
even
as
momentum
for
cloud
compu*ng
builds,
doubts
about
security
 difficul*es
of
cloud
compu*ng
persist
 •  Organiza*ons
most
frequently
protect
themselves
through
tradi*onal
IT
 security
solu*ons
and
legal
or
indemnifica*on
agreements
with
vendors.
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 12

  • 13. Ponemon
Study
finds
Fewer
than
One
in
Ten
Companies
 Evaluate
Vendors
or
Train
Employees
on
Cloud
Security:
 •  More
than
75
percent
of
respondents
noted
that
the
migra*on
to
 cloud
compu*ng
was
occurring
in
a
less‐than
ideal
manner,
due
 to
a
lack
of
control
over
end
users
 •  Only
27
percent
of
respondents
said
their
organiza*ons
have
 procedures
for
approving
cloud
applica*ons
that
use
sensi*ve
or
 confiden*al
informa*on
 •  68
percent
indicated
that
ownership
for
evalua*ng
cloud
 compu*ng
vendors
resides
with
end
users
and
business
managers
 •  Only
20
percent
of
the
organiza*ons
surveyed
reported
that
their
 informa*on
security
teams
are
regularly
involved
in
the
decision
 making
process
and
approximately
a
quarter
said
they
never
 par*cipated
at
all
 •  69
percent
of
the
respondents
indicated
they
would
prefer
to
see
 the
informa*on
security
or
corporate
IT
teams
lead
the
cloud
 decision
making
process
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 13

  • 14. Policy
and
Procedural
Gaps
 Source:
Ponemon
Ins*tute
study
for
Symantec:
“Flying
Blind
in
the
Cloud”,
 April
7,
2010
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 14

  • 16. Cloud
Compu4ng
Vendors
Review
“Process”
 Source:
Ponemon
Ins*tute
study
for
Symantec:
“Flying
Blind
in
the
Cloud”,
 April
7,
2010
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 16

  • 17. Organiza4onal
steps
to
ensure
data
protec4on
 Source:
Ponemon
Ins*tute
study
for
Symantec:
“Flying
Blind
in
the
Cloud”,
 April
7,
2010
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 17

  • 19. Managing
Privacy
in
the
Cloud
 •  Policies
and
procedures
must
explicitly
address
cloud
privacy
 risks
 •  Informa*on
governance
must
be
put
in
place
that:
 –  Provides
tools
and
procedures
for
classifying
informa*on
and
assessing
risk

 –  Establish
policies
for
cloud‐based
processing
based
upon
risk
and
value
of
 asset.

 •  Evaluate
third
par*es’
security
and
privacy
capabili*es
before
 sharing
confiden*al
or
sensi*ve
informa*on.

 –  Thorough
review
and
audit
of
vendors
 –  Independent
third
party
verifica*on

 •  Train
employees
and
staff
accordingly
to
mi*gate
security/ privacy
risks
in
cloud
compu*ng
 –  Address
from
mul*‐departmental
perspec*ve
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 19

  • 20. Model
for
Managing
Cloud
Risks
‐
Governance
 •  Strategy:
 –  What
kinds
of
data
will
you
as
a
maber
of
course
not
allow
to
go
to
the
 cloud?
What
kind
of
cloud
is
appropriate
for
certain
types
of
data?
 –  Implicit:
you
have
a
data
classifica*on
system
that
you
follow
and
know
 the
value
of
your
data
assets
 •  Educa*on
&
training
 –  Train
users/business
units
that
this
requires
vendor
review
just
as
any
 other
vendor
 •  Resources
&
Ownership
 –  Academic
to
have
nice
policies,
contractual
language
permikng
audit
 rights,
if
you
don’t
have
staff
to
do
it
 –  Everyone
wants
Informa*on
Security
or
IT
to
own
this
–
equip
them
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 20

  • 21. Model
for
Managing
Cloud
Risks
–
Formal
Risk
 Management
 •  Privacy
Risk/Impact
Assessment
 –  Document
ownership
of
risks,
mi*ga*ons
 •  Data
Flow
Diagram
 –  Iden*fy
types
of
PII
in
flow,
as
well
as
what
systems,
en**es
and
 jurisdic*ons
that
data
flows
through
 •  Security
Assessments
&
Measures
 –  Appropriate
measures
to
ensure
adequate
applica*on
security,
 development
processes
and
penetra*on/vulnerability
tes*ng
 –  Require
regular
tes*ng
as
well
as
at
outset
of
rela*onship
 –  Consider
strategies
based
on
encryp*on,
data
obfusca*on

 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 21

  • 22. Model
for
Managing
Cloud
Risks
–
Contract
&
Audit
 •  Legal
Models
 –  Develop
appropriate
contractual
terms
to
ensure
protec*on
of
the
types
of
 data
you
want
to
process:
 •  Records
reten4on
&
lawful
access
 •  Access
 •  Data
sharing
risks/commingling
 •  Jurisdic4onal
risks
 •  Flow‐down
of
requirements
for
security,
audit,
evidence
of
compliance
for
sub‐contractors
 –  Revisit/revise
customer
privacy
no*ces,
agreements:
do
they
reflect
what
you
 are
doing
with
the
data?

 •  Monitoring
 –  Ensure
that
there
are
mechanisms
technical
and
organiza*onal
to
assess
and
 audit
cloud
vendor’s
use
of
data
 •  Audit
and
Third
Party
Cer*fica*on
 –  Ensure
you
have
the
ability
to
audit
–
and
do
it
 –  Third
party
cer*fica*ons
as
a
minimum
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 22

  • 23. Thank
you!
 Constan*ne
Karbalio*s,
J.D.,
CIPP/C/IT
 constan*ne_karbalio*s@symantec.com
 416.402.9873
 Copyright
©
2010
Symantec
Corpora4on.
All
rights
reserved.
Symantec
and
the
Symantec
Logo
are
trademarks
or
registered
trademarks
of
Symantec
Corpora*on
or
its
affiliates
in
 the
U.S.
and
other
countries.

Other
names
may
be
trademarks
of
their
respec*ve
owners.
 This
document
is
provided
for
informa*onal
purposes
only
and
is
not
intended
as
adver*sing.

All
warran*es
rela*ng
to
the
informa*on
in
this
document,
either
express
or
implied,
 are
disclaimed
to
the
maximum
extent
allowed
by
law.

The
informa*on
in
this
document
is
subject
to
change
without
no*ce.
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 23