SlideShare a Scribd company logo
1 of 20
Wednesday, 14
December 2016
Top Considerations for Business Leaders
1
Cloud Computing ?
The practice of using a network of remote
servers hosted on the Internet to store,
manage, and process data, rather than a
local server or a personal computer.
2
Risk ?
A probability or threat of damage, injury,
liability, loss, or any other negative
occurrence that is caused by external or
internal vulnerabilities, and that may be
avoided through pre-emptive action
(businessdictionary)
CASE WITH CLOUD COMPUTING
Benefits
3
4
What is Cloud Risk Management?
Known knowns,
known Unknowns,
&
Unknown Unknowns
all lurk around cloud
Computing.
5
Many Risk in Cloud
Computing
3 Problems to focus on
Risk 2 (R2)
Loss of
control over
high-value
information
Risk 3 (R3)
Overreliance
on cloud
service
providers
Risk 1 (R1)
Cloud
initiatives not
aligned with
business
strategies
6
R1 : Aligning Cloud Projects With Business Strategy
Top Management
Cloud
Initiatives
Should align
with Business
Strategies
Let’s
minimize risk
exposure and
deliver value
Let’s Specify the type
of Cloud services to
adopt based on our
enterprise goals , Risk
Tolerance and Risk
appetite
We need
cloud
computing
Let’s get a
Vendor to get us
what we decided
on
7
Management should not focus on Benefits
alone but :
Provide Adequate visibility of Associated risk,
Challenge the adequacy of risk measures against appetite and
business strategy.
8
Some Solutions to R1
 Cloud value proposition, traceable links to business strategy and how benefits will be
measured
 Top business risk and treatment strategies, i.e., data security, privacy laws, data location,
business resilience, regulatory compliance
 Proposed cloud deployment model: public, private or hybrid and associated risk
implications
 Planned cloud service delivery model: Software as a Service (SaaS), Platform as a Service
(PaaS) or Infrastructure as a Service (IaaS), and associated risk implications
 Service provider selection criteria, including financial viability, operational stability and
cybersecurity capabilities
 Plausible business disruption scenarios and recovery plans
 Service level agreements (SLAs), incident response and operational governance
 Third-party assurance, penetration testing, vulnerability assessments and right-to-audit
clauses
9
R2: Protecting High-value Information
(Security Matters)
Multitenancy
Benefit : Economy of scale and lower
service cost.
Issues : Vulnerability or misconfiguration
can lead to compromise across
multiple customers
Shared responsibilities
10
Some Solutions to R2
 Information classification (Identify High-value Information Assets and secure In
accordance to priority level)
 Store High level information in private cloud . This help eliminate Multitenacity
and shared responsibilities
11
Solutions to R2 continued
 Encryption (High-value information should be encrypted when hosted in the cloud to
minimise the risk of unauthorised disclosure).
 Note :
 Robust key management is essential because loosing of key may result into data loss
 Ensure cloud encryption service includes disaster recovery and failover capabilities to
minimise business impact if keys are lost
 Define responsibilities for managing encryption keys. Retain key management to mitigate
external breach of the service provider or malicious compromise by the service provider’s
privileged users.
 Test to confirm database encryption will not adversely impact application performance.
 Complement data encryption with integrity protections such as digital signatures to maintain
data authenticity.
12
13
Solution to R2 continued
 privileged access management (Deploy Strong Controls Over High-privileged
Access). Recommendations to achieve this are :
 Implement strong passwords and automate security policy provisioning.
 Enforce two-factor authentication and two-person rule over high-impact activities.
 Log and monitor access to privileged accounts, including execution of high-impact
commands.
 Retain superuser account credentials for accounts that give full access to all cloud
resources.
 Regularly rotate passwords for service accounts, using an automated password
management solution
14
R3: Overreliance on Cloud service providers15
Minimising Reliance on Cloud Service Providers
 Review the cloud service provider’s business continuity plan and disaster recovery plan
to determine if they meet the organisation’s recovery objectives.
 Utilise multiple cloud service providers to reduce risk of vendor lock-in.
 Implement high-availability cloud architecture to minimise service interruption.
 Complement the resilient architecture with regular backup and restore procedures, and
store backup data outside of the cloud provider premises.
 Update and test the organisation’s crisis management plan.
 Simulate recovery from different disaster scenarios, including recovery of individual
applications, virtual environments and the entire cloud service provider.
 To maintain business continuity and facilitate smooth transitions, organisations should
formulate exit strategies or contingency plans to migrate critical records to an alternate
solution, cloud or non-cloud.
16
Benefit of Cloud Risk Management
 Identifying possible Problems
 Provision of Measures to Prevent risk
 Ensuring Cloud initiatives align with organisational Goals
 Getting the best value from Cloud computing
 Providing measure to minimize the effect of Risk if they occur
 Boost the confidence of Adopting and sustaining cloud computing
17
Conclusion
 When properly planned, implemented and governed, the cloud can be
a major catalyst for process improvement as well as a driver of
business transformation. Cloud service providers are working
relentlessly to improve their security and resilience capabilities.
 In reality, an organisation’s onsite systems may not be more secure
than the cloud.
 Security and reliability risk may not outweigh the lost opportunity to
transform an enterprise with strategic use of the cloud.
 Cloud initiatives built upon enterprise strategy, coupled with robust risk
management processes, have the potential to accelerate business
innovation, transform customer experiences and improve competitive
advantage.
18
Presenter
Ibrahim Adeboye, Apena
19
Don’t be Shy to ask Questions or make
Contributions
Reference : http://www.isaca.org/Journal/archives/2016/volume-4/Pages/managing-cloud-risk.aspx
20

More Related Content

What's hot

Taking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityTaking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityResolver Inc.
 
CLOUD-BASED BACKUP AND DISASTER RECOVERY. MANAGE. PROTECT. RECOVER
CLOUD-BASED BACKUP AND DISASTER RECOVERY. MANAGE. PROTECT. RECOVERCLOUD-BASED BACKUP AND DISASTER RECOVERY. MANAGE. PROTECT. RECOVER
CLOUD-BASED BACKUP AND DISASTER RECOVERY. MANAGE. PROTECT. RECOVERNexon Asia Pacific
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Servicestsaiblake
 
How to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public cloudsHow to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public cloudsOK2OK
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesDave Reeves
 
Security Consulting Methodology
Security Consulting MethodologySecurity Consulting Methodology
Security Consulting Methodologyciso_insights
 
Security Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident ResponseSecurity Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident ResponseSiemplify
 
End Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoEnd Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoePlus
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceF-Secure Corporation
 
Top 10 Cybersecurity Tips of 2022
Top 10 Cybersecurity Tips of 2022Top 10 Cybersecurity Tips of 2022
Top 10 Cybersecurity Tips of 2022The TNS Group
 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security PresentationIdeba
 
Information Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeInformation Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeResolver Inc.
 
Global Cybersecurity Consulting Firm
Global Cybersecurity Consulting FirmGlobal Cybersecurity Consulting Firm
Global Cybersecurity Consulting Firmwilsonconsulting1
 
Justifying Utility Security Investments
 Justifying Utility Security Investments Justifying Utility Security Investments
Justifying Utility Security InvestmentsBlack & Veatch
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfYounesChafi1
 
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionLarry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionTrish McGinity, CCSK
 
Clio Commercial Flyer 2012 R1
Clio Commercial Flyer 2012 R1Clio Commercial Flyer 2012 R1
Clio Commercial Flyer 2012 R1Ian Horwood
 

What's hot (20)

Taking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityTaking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business Continuity
 
CLOUD-BASED BACKUP AND DISASTER RECOVERY. MANAGE. PROTECT. RECOVER
CLOUD-BASED BACKUP AND DISASTER RECOVERY. MANAGE. PROTECT. RECOVERCLOUD-BASED BACKUP AND DISASTER RECOVERY. MANAGE. PROTECT. RECOVER
CLOUD-BASED BACKUP AND DISASTER RECOVERY. MANAGE. PROTECT. RECOVER
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Services
 
How to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public cloudsHow to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public clouds
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
 
Security Consulting Methodology
Security Consulting MethodologySecurity Consulting Methodology
Security Consulting Methodology
 
Security Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident ResponseSecurity Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident Response
 
7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan
 
End Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoEnd Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and Cisco
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
 
Top 10 Cybersecurity Tips of 2022
Top 10 Cybersecurity Tips of 2022Top 10 Cybersecurity Tips of 2022
Top 10 Cybersecurity Tips of 2022
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security Presentation
 
Information Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeInformation Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data Safe
 
Global Cybersecurity Consulting Firm
Global Cybersecurity Consulting FirmGlobal Cybersecurity Consulting Firm
Global Cybersecurity Consulting Firm
 
Justifying Utility Security Investments
 Justifying Utility Security Investments Justifying Utility Security Investments
Justifying Utility Security Investments
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
 
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionLarry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
 
Clio Commercial Flyer 2012 R1
Clio Commercial Flyer 2012 R1Clio Commercial Flyer 2012 R1
Clio Commercial Flyer 2012 R1
 

Viewers also liked

portfolio - project2 - architecture
portfolio - project2 - architectureportfolio - project2 - architecture
portfolio - project2 - architectureYelda Duman
 
UN-Habitat Strategic Plan
UN-Habitat Strategic PlanUN-Habitat Strategic Plan
UN-Habitat Strategic PlanJohn Hogan
 
December2016_McCraren_Transport
December2016_McCraren_TransportDecember2016_McCraren_Transport
December2016_McCraren_TransportI. Zuzeth Zazueta
 
Instrument & Control Pictures
Instrument & Control Pictures Instrument & Control Pictures
Instrument & Control Pictures mfkhroosa
 
Cuaderno electronico ( eduardo fernadez cervantes 2 a
Cuaderno electronico ( eduardo fernadez cervantes 2 aCuaderno electronico ( eduardo fernadez cervantes 2 a
Cuaderno electronico ( eduardo fernadez cervantes 2 aJorge Bautista
 
URSA TECNebook - Isolamento controterra e sottofondazione con URSA XPS
URSA TECNebook - Isolamento controterra e sottofondazione con URSA XPSURSA TECNebook - Isolamento controterra e sottofondazione con URSA XPS
URSA TECNebook - Isolamento controterra e sottofondazione con URSA XPSAlessandra Costa
 

Viewers also liked (12)

Disfunzione Mai Piu - Fabian Viatri
Disfunzione Mai Piu - Fabian ViatriDisfunzione Mai Piu - Fabian Viatri
Disfunzione Mai Piu - Fabian Viatri
 
portfolio - project2 - architecture
portfolio - project2 - architectureportfolio - project2 - architecture
portfolio - project2 - architecture
 
UN-Habitat Strategic Plan
UN-Habitat Strategic PlanUN-Habitat Strategic Plan
UN-Habitat Strategic Plan
 
Process Entropia
Process EntropiaProcess Entropia
Process Entropia
 
December2016_McCraren_Transport
December2016_McCraren_TransportDecember2016_McCraren_Transport
December2016_McCraren_Transport
 
Instrument & Control Pictures
Instrument & Control Pictures Instrument & Control Pictures
Instrument & Control Pictures
 
Shapeshifter Yoga - Kris Fondran
Shapeshifter Yoga - Kris FondranShapeshifter Yoga - Kris Fondran
Shapeshifter Yoga - Kris Fondran
 
Cuaderno electronico ( eduardo fernadez cervantes 2 a
Cuaderno electronico ( eduardo fernadez cervantes 2 aCuaderno electronico ( eduardo fernadez cervantes 2 a
Cuaderno electronico ( eduardo fernadez cervantes 2 a
 
URSA TECNebook - Isolamento controterra e sottofondazione con URSA XPS
URSA TECNebook - Isolamento controterra e sottofondazione con URSA XPSURSA TECNebook - Isolamento controterra e sottofondazione con URSA XPS
URSA TECNebook - Isolamento controterra e sottofondazione con URSA XPS
 
BrandInWest: Solberg
BrandInWest: SolbergBrandInWest: Solberg
BrandInWest: Solberg
 
ротаметр тип A
ротаметр тип Aротаметр тип A
ротаметр тип A
 
Site plan
Site planSite plan
Site plan
 

Similar to Group reading assignments on managing cloud risk

Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
A Comprehensive Guide to Successful Cloud Migrations.pptx
A Comprehensive Guide to Successful Cloud Migrations.pptxA Comprehensive Guide to Successful Cloud Migrations.pptx
A Comprehensive Guide to Successful Cloud Migrations.pptxXcelligen Inc
 
Cisco Powered DRaaS eBook
Cisco Powered DRaaS eBookCisco Powered DRaaS eBook
Cisco Powered DRaaS eBookCisco Powered
 
Hybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdfHybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdfmanoharparakh
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01promediakw
 
Multi cloud Strategies Pros, Cons, and Best Practices.pdf
Multi cloud Strategies Pros, Cons, and Best Practices.pdfMulti cloud Strategies Pros, Cons, and Best Practices.pdf
Multi cloud Strategies Pros, Cons, and Best Practices.pdfCIOWomenMagazine
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogativeWayne Poggenpoel
 
benefits of cloud computing course
benefits   of   cloud  computing  coursebenefits   of   cloud  computing  course
benefits of cloud computing coursesndshkgowda
 
The Hidden Risks of Cloud-Based Nonprofit Accounting Software
The Hidden Risks of Cloud-Based Nonprofit Accounting SoftwareThe Hidden Risks of Cloud-Based Nonprofit Accounting Software
The Hidden Risks of Cloud-Based Nonprofit Accounting SoftwareTangicloud
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxsarah david
 
Cloud Strategy Methodology Visualisation
Cloud Strategy Methodology VisualisationCloud Strategy Methodology Visualisation
Cloud Strategy Methodology VisualisationGareth Llewellyn
 
Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016Matthew Rosenquist
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfCiente
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfsarah david
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...Symantec
 

Similar to Group reading assignments on managing cloud risk (20)

Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
A Comprehensive Guide to Successful Cloud Migrations.pptx
A Comprehensive Guide to Successful Cloud Migrations.pptxA Comprehensive Guide to Successful Cloud Migrations.pptx
A Comprehensive Guide to Successful Cloud Migrations.pptx
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Cisco Powered DRaaS eBook
Cisco Powered DRaaS eBookCisco Powered DRaaS eBook
Cisco Powered DRaaS eBook
 
Hybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdfHybrid & Multi-cloud Environment.pdf
Hybrid & Multi-cloud Environment.pdf
 
Cloud capability for startups
Cloud capability for startupsCloud capability for startups
Cloud capability for startups
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
 
Multi cloud Strategies Pros, Cons, and Best Practices.pdf
Multi cloud Strategies Pros, Cons, and Best Practices.pdfMulti cloud Strategies Pros, Cons, and Best Practices.pdf
Multi cloud Strategies Pros, Cons, and Best Practices.pdf
 
AWS Services 7 Transformation Media
AWS Services 7 Transformation MediaAWS Services 7 Transformation Media
AWS Services 7 Transformation Media
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
benefits of cloud computing course
benefits   of   cloud  computing  coursebenefits   of   cloud  computing  course
benefits of cloud computing course
 
The Hidden Risks of Cloud-Based Nonprofit Accounting Software
The Hidden Risks of Cloud-Based Nonprofit Accounting SoftwareThe Hidden Risks of Cloud-Based Nonprofit Accounting Software
The Hidden Risks of Cloud-Based Nonprofit Accounting Software
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
Cloud Strategy Methodology Visualisation
Cloud Strategy Methodology VisualisationCloud Strategy Methodology Visualisation
Cloud Strategy Methodology Visualisation
 
Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...
Symantec Disaster Recovery Orchestrator: One Click Disaster Recovery to the C...
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 

Group reading assignments on managing cloud risk

  • 1. Wednesday, 14 December 2016 Top Considerations for Business Leaders 1
  • 2. Cloud Computing ? The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. 2 Risk ? A probability or threat of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal vulnerabilities, and that may be avoided through pre-emptive action (businessdictionary)
  • 3. CASE WITH CLOUD COMPUTING Benefits 3
  • 4. 4
  • 5. What is Cloud Risk Management? Known knowns, known Unknowns, & Unknown Unknowns all lurk around cloud Computing. 5
  • 6. Many Risk in Cloud Computing 3 Problems to focus on Risk 2 (R2) Loss of control over high-value information Risk 3 (R3) Overreliance on cloud service providers Risk 1 (R1) Cloud initiatives not aligned with business strategies 6
  • 7. R1 : Aligning Cloud Projects With Business Strategy Top Management Cloud Initiatives Should align with Business Strategies Let’s minimize risk exposure and deliver value Let’s Specify the type of Cloud services to adopt based on our enterprise goals , Risk Tolerance and Risk appetite We need cloud computing Let’s get a Vendor to get us what we decided on 7
  • 8. Management should not focus on Benefits alone but : Provide Adequate visibility of Associated risk, Challenge the adequacy of risk measures against appetite and business strategy. 8
  • 9. Some Solutions to R1  Cloud value proposition, traceable links to business strategy and how benefits will be measured  Top business risk and treatment strategies, i.e., data security, privacy laws, data location, business resilience, regulatory compliance  Proposed cloud deployment model: public, private or hybrid and associated risk implications  Planned cloud service delivery model: Software as a Service (SaaS), Platform as a Service (PaaS) or Infrastructure as a Service (IaaS), and associated risk implications  Service provider selection criteria, including financial viability, operational stability and cybersecurity capabilities  Plausible business disruption scenarios and recovery plans  Service level agreements (SLAs), incident response and operational governance  Third-party assurance, penetration testing, vulnerability assessments and right-to-audit clauses 9
  • 10. R2: Protecting High-value Information (Security Matters) Multitenancy Benefit : Economy of scale and lower service cost. Issues : Vulnerability or misconfiguration can lead to compromise across multiple customers Shared responsibilities 10
  • 11. Some Solutions to R2  Information classification (Identify High-value Information Assets and secure In accordance to priority level)  Store High level information in private cloud . This help eliminate Multitenacity and shared responsibilities 11
  • 12. Solutions to R2 continued  Encryption (High-value information should be encrypted when hosted in the cloud to minimise the risk of unauthorised disclosure).  Note :  Robust key management is essential because loosing of key may result into data loss  Ensure cloud encryption service includes disaster recovery and failover capabilities to minimise business impact if keys are lost  Define responsibilities for managing encryption keys. Retain key management to mitigate external breach of the service provider or malicious compromise by the service provider’s privileged users.  Test to confirm database encryption will not adversely impact application performance.  Complement data encryption with integrity protections such as digital signatures to maintain data authenticity. 12
  • 13. 13
  • 14. Solution to R2 continued  privileged access management (Deploy Strong Controls Over High-privileged Access). Recommendations to achieve this are :  Implement strong passwords and automate security policy provisioning.  Enforce two-factor authentication and two-person rule over high-impact activities.  Log and monitor access to privileged accounts, including execution of high-impact commands.  Retain superuser account credentials for accounts that give full access to all cloud resources.  Regularly rotate passwords for service accounts, using an automated password management solution 14
  • 15. R3: Overreliance on Cloud service providers15
  • 16. Minimising Reliance on Cloud Service Providers  Review the cloud service provider’s business continuity plan and disaster recovery plan to determine if they meet the organisation’s recovery objectives.  Utilise multiple cloud service providers to reduce risk of vendor lock-in.  Implement high-availability cloud architecture to minimise service interruption.  Complement the resilient architecture with regular backup and restore procedures, and store backup data outside of the cloud provider premises.  Update and test the organisation’s crisis management plan.  Simulate recovery from different disaster scenarios, including recovery of individual applications, virtual environments and the entire cloud service provider.  To maintain business continuity and facilitate smooth transitions, organisations should formulate exit strategies or contingency plans to migrate critical records to an alternate solution, cloud or non-cloud. 16
  • 17. Benefit of Cloud Risk Management  Identifying possible Problems  Provision of Measures to Prevent risk  Ensuring Cloud initiatives align with organisational Goals  Getting the best value from Cloud computing  Providing measure to minimize the effect of Risk if they occur  Boost the confidence of Adopting and sustaining cloud computing 17
  • 18. Conclusion  When properly planned, implemented and governed, the cloud can be a major catalyst for process improvement as well as a driver of business transformation. Cloud service providers are working relentlessly to improve their security and resilience capabilities.  In reality, an organisation’s onsite systems may not be more secure than the cloud.  Security and reliability risk may not outweigh the lost opportunity to transform an enterprise with strategic use of the cloud.  Cloud initiatives built upon enterprise strategy, coupled with robust risk management processes, have the potential to accelerate business innovation, transform customer experiences and improve competitive advantage. 18
  • 20. Don’t be Shy to ask Questions or make Contributions Reference : http://www.isaca.org/Journal/archives/2016/volume-4/Pages/managing-cloud-risk.aspx 20

Editor's Notes

  1. A publication of International Data Corporation (IDC) forecasts worldwide use of public cloud growing at 19.4 percent annually over the next five years, early doubling from approximately US $70 billion in 2015 to more than US $141 billion in 2019. This is almost six times the growth of enterprise IT spending as a whole.