SlideShare a Scribd company logo
1 of 6
Download to read offline
© Happiest Minds Technologies Pvt. Ltd. All Rights Reserved
Moving to Clouds? Simplify your
approach to understand the risks
and protect your data
By Thiruvadinathan
Happiest Minds,
Infrastructure Management and Security Services
© Happiest Minds Technologies Pvt. Ltd. All Rights Reserved
How to work with your Cloud vendor to secure sensitive and critical data on the cloud?
Engaging with a vendor especially one who provides some sort of Information and/or technology
based services is necessary for many global organizations. Managing risks related to vendors
presents its own challenges particularly if they are high technology companies such as Cloud
Service Providers (CSP).
Cloud based services add to the complexities of managing traditional security & compliance risks.
Identifying and addressing risks associated with moving your data, applications and services are not
the only thing that an organization has to consider. An organization also needs to think about and
plan for vendor related risks, legal, regulatory and contractual risks. This spectrum of risks
continues to expand particularly when dealing with customers and vendors who are operating in
different geographies governed by different regulations, data protection laws, culture and
operating models.
The following sections discuss some of the challenges involved in assessing those risks.
Are risks in the Cloud different?
The answer is yes and no. Clouds bring in both traditional information security risks such as
malicious users, malware, etc. as well as lack of control over and visibility into your data in terms of
who has access, where the data is located, how it is secured, etc. Some of the common lacunae in
addressing the risks in the Cloud are
 Lack of or inadequate security and compliance risk evaluation of CSPs due to:
o Business pressures and deadlines
o Lack of involvement from information security, risk and internal audit teams or
specialists during evaluation
o Inadequate knowledge about cloud security risks, mitigation and monitoring
technologies
o Legal complexities.
 Complexities involved in evaluating risk, security and compliance aspects of engaging
with a CSP since risks and requirements can vary widely depending on the type of Cloud
service(SaaS, IaaS, etc.) and model (Public, Private, etc.)
 Finding CSPs that treat all customers equally when it comes to risk, security and
compliance
 Lack of a formal contract or inadequate service contracts
o Lack of awareness on what need to be addressed in the contract such as
o Ownership & confidentiality of data
© Happiest Minds Technologies Pvt. Ltd. All Rights Reserved
o Compliance with your security policies based on mapping your controls to CSP’s
capabilities
o Data classification and corresponding security requirements for transmission,
storage, handling/usage, sharing, back-up, retention, geographical restrictions
on data movement within the cloud, disposal and e-discovery
o The right to audit and actual audit of CSP’ security controls
There are many other areas that need to be addressed in a contract. An article by a New York
business law firm provides insights into what needs to be addressed in a contract. The article can
be read at http://bit.ly/xMZNx6. Another article published on The Financial Times details about the
grey areas in a Cloud service contract, http://on.ft.com/N89J3Z.
This list of such lacunae could easily expand into other areas such as risks related to CSP’s staff in
terms of their background credentials, operational risks such as inadequate change management,
errors and omissions, failed back-ups and so on.
However, there is help available to address these challenges. No matter what standards you use
among ISO27001, PCI-DSS, NIST SP 800-53, CoBIT, etc., you can leverage your experience on those
and bring value to your assessment Cloud & Vendor risks. To know more about how, read on…
Simplify your approach to assess Cloud vendor risks
The Cloud Security Alliance (CSA) provides a security controls framework that can be used by CSPs
as well as Cloud consumers both. The assessment tools namely, the Consensus Assessment
Initiative Questionnaire (CAIQ) and Cloud Controls Matrix (CCM) are specifically designed for Cloud
environment to assess the associated risk and security requirements.
The rigor of going through multiple and long security assessment questionnaire can be quite
challenging both for the Cloud consumers as well as CSPs. Vendor risk assessment tools would
typically span multiple security domains requiring the involvement of staff from various functions
within the organization. The process takes considerable time, resources and skills to go through.
Smaller organizations may require additional resources and skills to do the evaluation of CSP.
Using CSA STAR in Cloud security assessments
To assist potential Cloud consumers and CSPs, the Cloud Security Alliance has come up with an
initiative known as STAR (CSA Security, Trust & Assurance Registry). STAR is a program participated
by many of the leading CSP. Participants of this program voluntarily prepare a self-assessment of
their controls and compliance posture in a format specified by CSA.
CSPs can make use of either CAIQ or CCM to perform self-assessment of their Cloud security
controls. The self-assessment reports are published by the respective CSPs and are made available.
The reports are free to download from https://cloudsecurityalliance.org/star/
© Happiest Minds Technologies Pvt. Ltd. All Rights Reserved
The STAR program also encourages participating vendors to be available for any question from the
consumers.
The advantage of this report is that the format provides for mapping with international standards
and best practices such as IS027001, COBIT, NIST, etc. This can simplify the overall assessment in
terms of rigor and also improve the focus on the controls that require more attention. The CSA also
provides a GRC stack those organizations that are willing to integrate CAIQ and CCM into their GRC
management solution.
The following section provides a simplified approach to assess the Cloud related risks.
Steps 1 – Prepare yourselves
 Determine what type of Cloud service (SaaS, PaaS, and IaaS) and Cloud model (Public,
Private, etc.) you require.
 Many CSPs are very likely to have implemented ISO27001. It is important to understand
the scope of such certification and to understand what controls have either been
implemented or omitted.
 If CSP have implemented ISO27001, then ask for their Statement of Applicability and
have a dialogue with them to understand how the applicable controls are implemented.
For CSPs that have not implemented ISO27001, ask for any other standard or regulatory
compliance that’s been implemented. Even a SAS70 Type 2 or SOC 2 report can be a
very good starting point.
 Determine if the CSP has undergone a self-assessment and obtain the report from CSA
website.
 Shortlist potential CSP vendors based on the above, check for credible references from
existing customers of the CSPs you are going to evaluate.
Step 2 – Perform an Analysis
 Perform a detailed analysis of the self-assessment reports from the CSPs. Evaluate the
controls in line with your data security and compliance requirements.
 Speak to their references to understand how their needs relates to your business
 Provide weightage to the CSP that is willing co-operate fully with your requirements
 Involve your legal, IT, security, risk and audit teams throughout the process
 Have a list of your regulatory compliance requirements to understand how the CSP
would help
Step 3 – Prioritize your requirements
 Based on your analysis, narrow down and prioritize risk areas that remain to be
addressed.
© Happiest Minds Technologies Pvt. Ltd. All Rights Reserved
 Use CAIQ to extract those areas as to how you need to prepare yourself for further
analysis
 Prepare your assessment questionnaire and have your shortlisted vendors respond to
them.
 Plan a site visit where you can get evaluate the responses you received as to how they
have been implemented
 During your visit, observe, inspect and document the controls implemented and
practiced as you would understand.
Step 4 - Prepare a risk and control plan
 Develop a plan that identifies the risks and controls that would address the risks.
 Make this plan as the basis for preparing your contractual terms and conditions in
conjunction with your shortlisted vendors
 Sensitize your users on on-going basis about the risks and controls
The huge advantage of this approach is that it can certainly help save a lot of time for the consumer
as well as provider. The actual assessment can effectively be reduced significantly depending on
the other factors such as availability of relevant skills and so on.
Depending on your organization’s unique cloud computing needs, security and compliance
requirements, your assessment must be tailored accordingly. A good understanding of the various
types of Cloud services and models would be required. For example, SaaS based model offers very
little room for control of data by the Cloud consumer, whereas IaaS offers the most flexibility. An
assessment for a SaaS service should cover infrastructure security, IT operational security,
application & data security as all these are fully under the control of CSP. The contract for a SaaS
service shall also be designed to address security risks in these areas. Physical and environmental
security is to be addressed anyway irrespective of the Cloud service, which determines the nature
and extent of any Cloud security assessment and contractual requirements.
Conclusion
As Cloud based services evolve along with the associated technologies, the standards for cloud
based risk management and assurance framework will have to evolve. The good news is existing
standards such as PCI DSS, ISO27001, etc. can be judiciously leveraged for initial as well as on-going
assessment of risk exposure and compliance status in conjunction with CSA’s initiatives. The key is
to keep updating your risk assessment framework and continuously engage with the CSP who’s
partnered with you to improve its services.
© Happiest Minds Technologies Pvt. Ltd. All Rights Reserved
To learn more about the Happiest Minds Cloud Security Offerings, please
write to us at business@happiestminds.com
About Happiest Minds
Happiest Minds is a next-generation IT services company helping clients differentiate and win with a unique
blend of innovative solutions and services based on the core technology pillars of cloud computing, social
computing, mobility and analytics. We combine an unparalleled experience, comprehensive capabilities in
the following industries: Retail, Media, CPG, Manufacturing, Banking and Financial services, Travel and
Hospitality and Hi-Tech with pragmatic, forward-thinking advisory capabilities for the world’s top businesses,
governments and organizations. Founded in 2011, Happiest Minds is privately held with headquarters in
Bangalore, India and offices in the USA and UK.
Corporate Office
Happiest Minds Technologies Pvt. Ltd.
Block II, Velankani Tech Park
43 Electronics City
Hosur Road, Bangalore 560100, INDIA
Phone: +91 80 332 03333
Fax: +91 80 332 03000
United States
116 Village Boulevard, Suite 200
Princeton, New Jersey, 08540
Phone:+1 609 951 2296
2018 156th Avenue NE #224
Bellevue, WA 98007
United Kingdom
200 Brook Drive, Green Park, Reading
Berkshire, RG2 6UB
Phone: +44 11892 56072
Fax: + 44 11892 56073
About the author
Thiruvadinathan A (thiruvadinathan.a@happiestminds.com) is the Technical Director and Practice Lead
for IT Governance, Risk Management, Security & Compliance services. He credits his rich experience in the
field to his global clientele across industry verticals gained in the last 16 years. One of his recent
achievements is having successfully led Happiest Minds Technologies to meet the stringent requirements
of ISO27001 global standard.

More Related Content

What's hot

CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
Graeme Wood
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Doeren Mayhew
 
Cloud security - Auditing and Compliance
Cloud security - Auditing and ComplianceCloud security - Auditing and Compliance
Cloud security - Auditing and Compliance
Josh Tullo
 

What's hot (19)

Ensuring PCI DSS Compliance in the Cloud
Ensuring PCI DSS Compliance in the CloudEnsuring PCI DSS Compliance in the Cloud
Ensuring PCI DSS Compliance in the Cloud
 
Owasp top 10_proactive_controls_v3
Owasp top 10_proactive_controls_v3Owasp top 10_proactive_controls_v3
Owasp top 10_proactive_controls_v3
 
Data Sheet For Erg
Data Sheet For ErgData Sheet For Erg
Data Sheet For Erg
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
 
Cloud computing & service level agreements
Cloud computing & service level agreementsCloud computing & service level agreements
Cloud computing & service level agreements
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Scott Hogg - Gtri cloud security knowledge and certs
Scott Hogg - Gtri cloud security knowledge and certsScott Hogg - Gtri cloud security knowledge and certs
Scott Hogg - Gtri cloud security knowledge and certs
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
GDPR
GDPRGDPR
GDPR
 
Ch4 cism 2014
Ch4 cism 2014Ch4 cism 2014
Ch4 cism 2014
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb final
 
Building an Effective Supply Chain Security Program
Building an Effective Supply Chain Security ProgramBuilding an Effective Supply Chain Security Program
Building an Effective Supply Chain Security Program
 
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaCybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabia
 
Mindtree agile offering.
Mindtree agile offering.Mindtree agile offering.
Mindtree agile offering.
 
QSA Shares PCI 3.0 Advice & Checklist
QSA Shares PCI 3.0 Advice & ChecklistQSA Shares PCI 3.0 Advice & Checklist
QSA Shares PCI 3.0 Advice & Checklist
 
Cloud security - Auditing and Compliance
Cloud security - Auditing and ComplianceCloud security - Auditing and Compliance
Cloud security - Auditing and Compliance
 
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
 
Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)
 

Viewers also liked

Viewers also liked (11)

Goggles for retail banking
Goggles for retail bankingGoggles for retail banking
Goggles for retail banking
 
Whitepaper: Network transitioning from IPv4 to IPv6 Document - Happiest Minds
Whitepaper: Network transitioning from IPv4 to IPv6 Document - Happiest MindsWhitepaper: Network transitioning from IPv4 to IPv6 Document - Happiest Minds
Whitepaper: Network transitioning from IPv4 to IPv6 Document - Happiest Minds
 
Whitepaper: GroupWise 8.0.2 to Exchange 2010 Migration - Happiest Minds
Whitepaper: GroupWise 8.0.2 to Exchange 2010 Migration - Happiest MindsWhitepaper: GroupWise 8.0.2 to Exchange 2010 Migration - Happiest Minds
Whitepaper: GroupWise 8.0.2 to Exchange 2010 Migration - Happiest Minds
 
Whitepaper: Dealing with the Dilemma: Mobile App Development Approach & Decis...
Whitepaper: Dealing with the Dilemma: Mobile App Development Approach & Decis...Whitepaper: Dealing with the Dilemma: Mobile App Development Approach & Decis...
Whitepaper: Dealing with the Dilemma: Mobile App Development Approach & Decis...
 
Whitepaper: Continuous Compliance in SAP Environments - Happiest Minds
Whitepaper: Continuous Compliance in SAP Environments - Happiest MindsWhitepaper: Continuous Compliance in SAP Environments - Happiest Minds
Whitepaper: Continuous Compliance in SAP Environments - Happiest Minds
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
 
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
 
Whitepaper: Network Penetration Testing - Happiest Minds
Whitepaper: Network Penetration Testing - Happiest MindsWhitepaper: Network Penetration Testing - Happiest Minds
Whitepaper: Network Penetration Testing - Happiest Minds
 
Whitepaper: Social Commerce: The transformation of eCommerce with Social Comp...
Whitepaper: Social Commerce: The transformation of eCommerce with Social Comp...Whitepaper: Social Commerce: The transformation of eCommerce with Social Comp...
Whitepaper: Social Commerce: The transformation of eCommerce with Social Comp...
 
6 Applications of IoT for Building Automation Solutions
6 Applications of IoT for Building Automation Solutions6 Applications of IoT for Building Automation Solutions
6 Applications of IoT for Building Automation Solutions
 
Download whitepaper on Digital transformation-in-banking
Download whitepaper on Digital transformation-in-bankingDownload whitepaper on Digital transformation-in-banking
Download whitepaper on Digital transformation-in-banking
 

Similar to Whitepaper: Moving to Clouds? Simplify your approach to understand the risks and protect your data - Happiest Minds

Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
David Spinks
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
drewz lin
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
amburyj3c9
 
Mitigate Risks of Cloud Computing
Mitigate Risks of Cloud ComputingMitigate Risks of Cloud Computing
Mitigate Risks of Cloud Computing
DarienYamin
 

Similar to Whitepaper: Moving to Clouds? Simplify your approach to understand the risks and protect your data - Happiest Minds (20)

Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
 
Secure Cloud Adoption - Checklist
Secure Cloud Adoption - ChecklistSecure Cloud Adoption - Checklist
Secure Cloud Adoption - Checklist
 
EMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services ProvidersEMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services Providers
 
Sia Partners Insights when Considering a SaaS Solution
Sia Partners Insights when Considering a SaaS SolutionSia Partners Insights when Considering a SaaS Solution
Sia Partners Insights when Considering a SaaS Solution
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptx
 
Cc unit 4 updated version
Cc unit 4 updated versionCc unit 4 updated version
Cc unit 4 updated version
 
Optiv Security Award Write Up
Optiv Security Award Write UpOptiv Security Award Write Up
Optiv Security Award Write Up
 
Mitigate Risks of Cloud Computing
Mitigate Risks of Cloud ComputingMitigate Risks of Cloud Computing
Mitigate Risks of Cloud Computing
 
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
 
New Era in Insurance - Cloud Computing
New Era in Insurance - Cloud ComputingNew Era in Insurance - Cloud Computing
New Era in Insurance - Cloud Computing
 
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
 
Introduction to CSA Australia 2013 by David Ross
Introduction to CSA Australia 2013 by David RossIntroduction to CSA Australia 2013 by David Ross
Introduction to CSA Australia 2013 by David Ross
 
Compliance in Public Cloud & CSA Framework
Compliance in Public Cloud & CSA FrameworkCompliance in Public Cloud & CSA Framework
Compliance in Public Cloud & CSA Framework
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
 

More from Happiest Minds Technologies

More from Happiest Minds Technologies (20)

Largest Electricity provider in the US- Case Study
Largest Electricity provider in the US- Case StudyLargest Electricity provider in the US- Case Study
Largest Electricity provider in the US- Case Study
 
BFSI GLOBAL TRENDS FY 24
BFSI GLOBAL TRENDS FY 24BFSI GLOBAL TRENDS FY 24
BFSI GLOBAL TRENDS FY 24
 
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKINGARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
 
DIGITAL MANUFACTURING
DIGITAL MANUFACTURINGDIGITAL MANUFACTURING
DIGITAL MANUFACTURING
 
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & InsuranceExploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
 
AN OVERVIEW OF THE METAVERSE
AN OVERVIEW OF THE METAVERSEAN OVERVIEW OF THE METAVERSE
AN OVERVIEW OF THE METAVERSE
 
VMware to AWS Cloud Migration
VMware to AWS Cloud MigrationVMware to AWS Cloud Migration
VMware to AWS Cloud Migration
 
Digital-Content-Monetization-DCM-Platform-2.pdf
Digital-Content-Monetization-DCM-Platform-2.pdfDigital-Content-Monetization-DCM-Platform-2.pdf
Digital-Content-Monetization-DCM-Platform-2.pdf
 
Cloud Reshaping Banking
Cloud Reshaping BankingCloud Reshaping Banking
Cloud Reshaping Banking
 
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKAutomating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UK
 
PAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArkPAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArk
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)
 
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
 
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
 
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
 
How to Approach Tool Integrations
How to Approach Tool IntegrationsHow to Approach Tool Integrations
How to Approach Tool Integrations
 
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDITREDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
 
Contact Centre Growing Digital
Contact Centre Growing DigitalContact Centre Growing Digital
Contact Centre Growing Digital
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Whitepaper: Moving to Clouds? Simplify your approach to understand the risks and protect your data - Happiest Minds

  • 1. © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved Moving to Clouds? Simplify your approach to understand the risks and protect your data By Thiruvadinathan Happiest Minds, Infrastructure Management and Security Services
  • 2. © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved How to work with your Cloud vendor to secure sensitive and critical data on the cloud? Engaging with a vendor especially one who provides some sort of Information and/or technology based services is necessary for many global organizations. Managing risks related to vendors presents its own challenges particularly if they are high technology companies such as Cloud Service Providers (CSP). Cloud based services add to the complexities of managing traditional security & compliance risks. Identifying and addressing risks associated with moving your data, applications and services are not the only thing that an organization has to consider. An organization also needs to think about and plan for vendor related risks, legal, regulatory and contractual risks. This spectrum of risks continues to expand particularly when dealing with customers and vendors who are operating in different geographies governed by different regulations, data protection laws, culture and operating models. The following sections discuss some of the challenges involved in assessing those risks. Are risks in the Cloud different? The answer is yes and no. Clouds bring in both traditional information security risks such as malicious users, malware, etc. as well as lack of control over and visibility into your data in terms of who has access, where the data is located, how it is secured, etc. Some of the common lacunae in addressing the risks in the Cloud are  Lack of or inadequate security and compliance risk evaluation of CSPs due to: o Business pressures and deadlines o Lack of involvement from information security, risk and internal audit teams or specialists during evaluation o Inadequate knowledge about cloud security risks, mitigation and monitoring technologies o Legal complexities.  Complexities involved in evaluating risk, security and compliance aspects of engaging with a CSP since risks and requirements can vary widely depending on the type of Cloud service(SaaS, IaaS, etc.) and model (Public, Private, etc.)  Finding CSPs that treat all customers equally when it comes to risk, security and compliance  Lack of a formal contract or inadequate service contracts o Lack of awareness on what need to be addressed in the contract such as o Ownership & confidentiality of data
  • 3. © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved o Compliance with your security policies based on mapping your controls to CSP’s capabilities o Data classification and corresponding security requirements for transmission, storage, handling/usage, sharing, back-up, retention, geographical restrictions on data movement within the cloud, disposal and e-discovery o The right to audit and actual audit of CSP’ security controls There are many other areas that need to be addressed in a contract. An article by a New York business law firm provides insights into what needs to be addressed in a contract. The article can be read at http://bit.ly/xMZNx6. Another article published on The Financial Times details about the grey areas in a Cloud service contract, http://on.ft.com/N89J3Z. This list of such lacunae could easily expand into other areas such as risks related to CSP’s staff in terms of their background credentials, operational risks such as inadequate change management, errors and omissions, failed back-ups and so on. However, there is help available to address these challenges. No matter what standards you use among ISO27001, PCI-DSS, NIST SP 800-53, CoBIT, etc., you can leverage your experience on those and bring value to your assessment Cloud & Vendor risks. To know more about how, read on… Simplify your approach to assess Cloud vendor risks The Cloud Security Alliance (CSA) provides a security controls framework that can be used by CSPs as well as Cloud consumers both. The assessment tools namely, the Consensus Assessment Initiative Questionnaire (CAIQ) and Cloud Controls Matrix (CCM) are specifically designed for Cloud environment to assess the associated risk and security requirements. The rigor of going through multiple and long security assessment questionnaire can be quite challenging both for the Cloud consumers as well as CSPs. Vendor risk assessment tools would typically span multiple security domains requiring the involvement of staff from various functions within the organization. The process takes considerable time, resources and skills to go through. Smaller organizations may require additional resources and skills to do the evaluation of CSP. Using CSA STAR in Cloud security assessments To assist potential Cloud consumers and CSPs, the Cloud Security Alliance has come up with an initiative known as STAR (CSA Security, Trust & Assurance Registry). STAR is a program participated by many of the leading CSP. Participants of this program voluntarily prepare a self-assessment of their controls and compliance posture in a format specified by CSA. CSPs can make use of either CAIQ or CCM to perform self-assessment of their Cloud security controls. The self-assessment reports are published by the respective CSPs and are made available. The reports are free to download from https://cloudsecurityalliance.org/star/
  • 4. © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved The STAR program also encourages participating vendors to be available for any question from the consumers. The advantage of this report is that the format provides for mapping with international standards and best practices such as IS027001, COBIT, NIST, etc. This can simplify the overall assessment in terms of rigor and also improve the focus on the controls that require more attention. The CSA also provides a GRC stack those organizations that are willing to integrate CAIQ and CCM into their GRC management solution. The following section provides a simplified approach to assess the Cloud related risks. Steps 1 – Prepare yourselves  Determine what type of Cloud service (SaaS, PaaS, and IaaS) and Cloud model (Public, Private, etc.) you require.  Many CSPs are very likely to have implemented ISO27001. It is important to understand the scope of such certification and to understand what controls have either been implemented or omitted.  If CSP have implemented ISO27001, then ask for their Statement of Applicability and have a dialogue with them to understand how the applicable controls are implemented. For CSPs that have not implemented ISO27001, ask for any other standard or regulatory compliance that’s been implemented. Even a SAS70 Type 2 or SOC 2 report can be a very good starting point.  Determine if the CSP has undergone a self-assessment and obtain the report from CSA website.  Shortlist potential CSP vendors based on the above, check for credible references from existing customers of the CSPs you are going to evaluate. Step 2 – Perform an Analysis  Perform a detailed analysis of the self-assessment reports from the CSPs. Evaluate the controls in line with your data security and compliance requirements.  Speak to their references to understand how their needs relates to your business  Provide weightage to the CSP that is willing co-operate fully with your requirements  Involve your legal, IT, security, risk and audit teams throughout the process  Have a list of your regulatory compliance requirements to understand how the CSP would help Step 3 – Prioritize your requirements  Based on your analysis, narrow down and prioritize risk areas that remain to be addressed.
  • 5. © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved  Use CAIQ to extract those areas as to how you need to prepare yourself for further analysis  Prepare your assessment questionnaire and have your shortlisted vendors respond to them.  Plan a site visit where you can get evaluate the responses you received as to how they have been implemented  During your visit, observe, inspect and document the controls implemented and practiced as you would understand. Step 4 - Prepare a risk and control plan  Develop a plan that identifies the risks and controls that would address the risks.  Make this plan as the basis for preparing your contractual terms and conditions in conjunction with your shortlisted vendors  Sensitize your users on on-going basis about the risks and controls The huge advantage of this approach is that it can certainly help save a lot of time for the consumer as well as provider. The actual assessment can effectively be reduced significantly depending on the other factors such as availability of relevant skills and so on. Depending on your organization’s unique cloud computing needs, security and compliance requirements, your assessment must be tailored accordingly. A good understanding of the various types of Cloud services and models would be required. For example, SaaS based model offers very little room for control of data by the Cloud consumer, whereas IaaS offers the most flexibility. An assessment for a SaaS service should cover infrastructure security, IT operational security, application & data security as all these are fully under the control of CSP. The contract for a SaaS service shall also be designed to address security risks in these areas. Physical and environmental security is to be addressed anyway irrespective of the Cloud service, which determines the nature and extent of any Cloud security assessment and contractual requirements. Conclusion As Cloud based services evolve along with the associated technologies, the standards for cloud based risk management and assurance framework will have to evolve. The good news is existing standards such as PCI DSS, ISO27001, etc. can be judiciously leveraged for initial as well as on-going assessment of risk exposure and compliance status in conjunction with CSA’s initiatives. The key is to keep updating your risk assessment framework and continuously engage with the CSP who’s partnered with you to improve its services.
  • 6. © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved To learn more about the Happiest Minds Cloud Security Offerings, please write to us at business@happiestminds.com About Happiest Minds Happiest Minds is a next-generation IT services company helping clients differentiate and win with a unique blend of innovative solutions and services based on the core technology pillars of cloud computing, social computing, mobility and analytics. We combine an unparalleled experience, comprehensive capabilities in the following industries: Retail, Media, CPG, Manufacturing, Banking and Financial services, Travel and Hospitality and Hi-Tech with pragmatic, forward-thinking advisory capabilities for the world’s top businesses, governments and organizations. Founded in 2011, Happiest Minds is privately held with headquarters in Bangalore, India and offices in the USA and UK. Corporate Office Happiest Minds Technologies Pvt. Ltd. Block II, Velankani Tech Park 43 Electronics City Hosur Road, Bangalore 560100, INDIA Phone: +91 80 332 03333 Fax: +91 80 332 03000 United States 116 Village Boulevard, Suite 200 Princeton, New Jersey, 08540 Phone:+1 609 951 2296 2018 156th Avenue NE #224 Bellevue, WA 98007 United Kingdom 200 Brook Drive, Green Park, Reading Berkshire, RG2 6UB Phone: +44 11892 56072 Fax: + 44 11892 56073 About the author Thiruvadinathan A (thiruvadinathan.a@happiestminds.com) is the Technical Director and Practice Lead for IT Governance, Risk Management, Security & Compliance services. He credits his rich experience in the field to his global clientele across industry verticals gained in the last 16 years. One of his recent achievements is having successfully led Happiest Minds Technologies to meet the stringent requirements of ISO27001 global standard.