SlideShare a Scribd company logo
1 of 11
Download to read offline
www.skyviewpartners.com                                                                                       6/7/2012




                                                                             Carol Woodbury, President
                                                                                 SkyView Partners, Inc.
                                                                             www.skyviewpartners.com
                                                                                     @carolwoodbury




                                                          (c) SkyView Partners, Inc, 2012.
                                                                 All Rights Reserved.                     1




                                                        (c) SkyView Partners, Inc, 2012.
                                                               All Rights Reserved.                       2




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                               1
www.skyviewpartners.com                                                                         6/7/2012




                            Benefits:                        However:
                             Hardware                        Must meet
                             Support of the                   requirements of
                              hardware                         security policy
                             Software licensing              Legal requirements

                             Software maintenance            Compliance
                                                               requirements




                                                         (c) SkyView Partners, Inc, 2012.
                                                                All Rights Reserved.        3




                               Depends on the type of data




                                                         (c) SkyView Partners, Inc, 2012.
                                                                All Rights Reserved.        4




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                 2
www.skyviewpartners.com                                                                            6/7/2012




                               EU Data Protection Laws
                                ◦ Currently being revised




                                                            (c) SkyView Partners, Inc, 2012.
                                                                   All Rights Reserved.        5




                            Determines
                             Default access
                             Encryption requirements
                             Retention requirements
                             Storage requirements
                             Disposal method (both printed and online)


                            While considering
                             Compliance requirements
                             Legal considerations



                                                            (c) SkyView Partners, Inc, 2012.
                                                                   All Rights Reserved.        6




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                    3
www.skyviewpartners.com                                                                            6/7/2012




                               Data classification requirements don’t change just
                                because the data is now in the cloud




                                                            (c) SkyView Partners, Inc, 2012.
                                                                   All Rights Reserved.        7




                               Carefully plan the security and privacy aspects of cloud
                                computing solutions before engaging them (a cloud
                                provider.)
                               Understand the public cloud computing environment
                                offered by the cloud provider.
                               Ensure that a cloud computing solution satisfies
                                organizational security and privacy requirements.
                               Ensure that the client-side computing environment meets
                                organizational security and privacy requirements for cloud
                                computing.
                               Maintain accountability over the privacy and security of
                                data and applications implemented and deployed in public
                                cloud computing environments.

                                                            (c) SkyView Partners, Inc, 2012.
                                                                   All Rights Reserved.        8




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                    4
www.skyviewpartners.com                                                                               6/7/2012




                               Encryption
                               Auditing (logging)
                               No passwords in cleartext
                               Access controls
                               Reporting
                               Incident response handling

                               What will a QSA or auditor say …?



                                                              (c) SkyView Partners, Inc, 2012.
                                                                     All Rights Reserved.         9




                               Where is the data physically located
                               Incident response handling
                                ◦ Do you and provider have the same definition of a breach?
                               Can your SLAs be fulfilled?
                                ◦ (think disaster-recovery)


                               As well as compliance requirements




                                                              (c) SkyView Partners, Inc, 2012.
                                                                     All Rights Reserved.        10




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                       5
www.skyviewpartners.com                                                                                  6/7/2012




                               Questions for providers’ security practices:
                                ◦   Is admin (root) power limited to only those users needing it?
                                ◦   Who/What is logged?
                                ◦   Do administrators access systems via encrypted sessions?
                                ◦   What is the patch management strategy?
                                ◦   What anti-virus / anti-malware software is used?
                                ◦   Are the servers in compliance with
                                     PCI
                                     SOX
                                     HIPAA
                                ◦ Who are you audited by and can we see the results?

                                                                 (c) SkyView Partners, Inc, 2012.
                                                                        All Rights Reserved.        11




                               User management:
                                ◦ Process to integrate with HR to remove access?
                                     What about immediate removal for terminated
                                      employees/contractors?
                                ◦ Password composition rules?
                                ◦ Password change rules?




                                                                 (c) SkyView Partners, Inc, 2012.
                                                                        All Rights Reserved.        12




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                          6
www.skyviewpartners.com                                                                                      6/7/2012




                               Logging:
                                ◦ Invalid sign on attempts
                                     Lock-out for excess attempts
                                ◦   Reads and changes to HIPAA or PCI data
                                ◦   Access attempts to data
                                ◦   Retention of the logs
                                ◦   Review of the logs

                               Network logging:
                                ◦ Connections
                                ◦ Data movement – what about DLP?

                                                                     (c) SkyView Partners, Inc, 2012.
                                                                            All Rights Reserved.        13




                               Because the service provider holds so much data, they
                                may become a victim of a targeted attack

                               However … provider likely has
                                ◦ Network monitoring
                                ◦ Trained personnel to recognize and respond to the attack
                                ◦ Knowledge / Hardware to prevent or limit the attack




                                                                     (c) SkyView Partners, Inc, 2012.
                                                                            All Rights Reserved.        14




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                              7
www.skyviewpartners.com                                                                                   6/7/2012




                               Business level objectives
                               Responsibilities of both parties
                               Business continuity/disaster recovery
                               Redundancy
                               Maintenance
                               Data location
                               Data seizure
                               Provider failure
                               Jurisdiction
                               Brokers and resellers

                            http://www.ibm.com/developerworks/cloud/library/cl-
                            rev2sla.html?ca=drs-


                                                               (c) SkyView Partners, Inc, 2012.
                                                                      All Rights Reserved.           15




                               Security                               Incident response
                               Data encryption                        Transparency
                               Privacy                                Certification
                               Data retention and                     Performance definitions
                                deletion                               Monitoring
                               Hardware erasure,                      Auditability
                                destruction                            Metrics
                               Regulatory compliance                  Human interaction


                                                              (c) SkyView Partners, Inc, 2012. All
                                                                        Rights Reserved.             16




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                           8
www.skyviewpartners.com                                                                              6/7/2012




                               Determine your organization’s security and compliance
                                requirements for the type of data going to the cloud
                               Put the appropriate SLA in place
                                ◦ Terminology / Communication is key – make sure you agree to
                                  each others’ definitions
                               Monitor the results to determine if SLA is being met




                                                             (c) SkyView Partners, Inc, 2012.
                                                                    All Rights Reserved.        17




                               Find your private and confidential data

                               Do not assume it doesn’t exist just because it’s not
                                supposed to be a on specific server or in a specific
                                database!




                                                             (c) SkyView Partners, Inc, 2012.
                                                                    All Rights Reserved.        18




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                      9
www.skyviewpartners.com                                                                                 6/7/2012




                               Many organizations are realizing the benefits of
                                “private” clouds
                                ◦ Reduced hardware / software costs
                                ◦ Quicker patching
                                ◦ Consolidated security expertise
                                   Monitoring (NOC)
                                   Recognition and response to incidents
                                ◦ Consolidated logging (correlated events)
                                ◦ More layers of security (depending on the data requirements)




                                                                (c) SkyView Partners, Inc, 2012.
                                                                       All Rights Reserved.        19




                               Clouds specializing in meeting compliance needs:
                                ◦ PCI
                                ◦ HIPAA

                               Significantly more expensive but consider that with
                                public clouds you ‘get what you pay for.’




                                                                (c) SkyView Partners, Inc, 2012.
                                                                       All Rights Reserved.        20




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                        10
www.skyviewpartners.com                                                                                                 6/7/2012




                               Service providers have been providing “cloud” services
                                for many years
                                ◦ Private / Specialized cloud – typically without the dynamic
                                  allocation of new resources
                               Security/Compliance/Legal requirements you make of
                                them are the same as what we’ve been discussing.




                                                                           (c) SkyView Partners, Inc, 2012.
                                                                                  All Rights Reserved.             21




                            Best practices and Certifications for Cloud Security
                             https://cloudsecurityalliance.org/


                            Guidelines on Security and Privacy in Public Cloud Computing – National Institute of
                            Standards and Technology (NIST) SP 800-144
                               http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf

                            Cloud Computing Synopsis and Recommendations - – National Institute of Standards and
                            Technology (NIST) SP 800-146 – DRAFT
                             http://csrc.nist.gov/publications/drafts/800-146/Draft-NIST-SP800-146.pdf


                            Articles:
                             www.sans.org
                             www.isaca.org
                             Search ‘European cloud Computing Strategy’


                            Contact us at: info@skyviewpartners.com
                                             @carolwoodbury


                                                                           (c) SkyView Partners, Inc, 2012.
                                                                                  All Rights Reserved.             22




(c) SkyView Partners, Inc, 2012. All Rights Reserved.                                                                        11

More Related Content

Viewers also liked (7)

Business continuity with SAP on IBM i
Business continuity with SAP on IBM iBusiness continuity with SAP on IBM i
Business continuity with SAP on IBM i
 
Practical web services for RPG lab exercises
Practical web services for RPG lab exercisesPractical web services for RPG lab exercises
Practical web services for RPG lab exercises
 
IBM Systems Director Navigator for i
IBM Systems Director Navigator for iIBM Systems Director Navigator for i
IBM Systems Director Navigator for i
 
What's new with Zend server
What's new with Zend serverWhat's new with Zend server
What's new with Zend server
 
Using Ruby on IBM i (i5/OS)
Using Ruby on IBM i (i5/OS)Using Ruby on IBM i (i5/OS)
Using Ruby on IBM i (i5/OS)
 
Practical PHP by example Jan Leth-Kjaer
Practical PHP by example   Jan Leth-KjaerPractical PHP by example   Jan Leth-Kjaer
Practical PHP by example Jan Leth-Kjaer
 
Compiling the Compiler
Compiling the CompilerCompiling the Compiler
Compiling the Compiler
 

Similar to Security considerations for the cloud

Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecSecuring Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSec
CloudPassage
 
Setting Up Your Mobile Testing Factory for 2013
Setting Up Your Mobile Testing Factory for 2013Setting Up Your Mobile Testing Factory for 2013
Setting Up Your Mobile Testing Factory for 2013
SOASTA
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013
David Linthicum
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012
steveramsthel
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012
steveramsthel
 
CA Security - Deloitte IAM Summit - Vasu
CA Security - Deloitte IAM Summit  - VasuCA Security - Deloitte IAM Summit  - Vasu
CA Security - Deloitte IAM Summit - Vasu
Vasu Surabhi
 

Similar to Security considerations for the cloud (20)

Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...
Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...
Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...
 
Securing Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSecSecuring Your Cloud Servers with Halo NetSec
Securing Your Cloud Servers with Halo NetSec
 
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity SummitOAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
 
Software Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and StorageSoftware Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and Storage
 
eFolder AppAssure Cloud Briefing_Public
eFolder AppAssure Cloud Briefing_PubliceFolder AppAssure Cloud Briefing_Public
eFolder AppAssure Cloud Briefing_Public
 
Setting Up Your Mobile Testing Factory for 2013
Setting Up Your Mobile Testing Factory for 2013Setting Up Your Mobile Testing Factory for 2013
Setting Up Your Mobile Testing Factory for 2013
 
Software Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and StorageSoftware Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and Storage
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012
 
STPCon fall 2012: The Testing Renaissance Has Arrived
STPCon fall 2012: The Testing Renaissance Has ArrivedSTPCon fall 2012: The Testing Renaissance Has Arrived
STPCon fall 2012: The Testing Renaissance Has Arrived
 
Cloud security ely kahn
Cloud security   ely kahnCloud security   ely kahn
Cloud security ely kahn
 
eFolder BDR Partner Presentation
eFolder BDR Partner PresentationeFolder BDR Partner Presentation
eFolder BDR Partner Presentation
 
WinWire_azure_session
WinWire_azure_sessionWinWire_azure_session
WinWire_azure_session
 
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs NoweFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
eFolder Webinar, Seven Great Reasons to Upgrade Legacy BDRs Now
 
Exploiting Linked Data via Filemaker
Exploiting Linked Data via FilemakerExploiting Linked Data via Filemaker
Exploiting Linked Data via Filemaker
 
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
 
Identity Management for the Cloud
Identity Management for the CloudIdentity Management for the Cloud
Identity Management for the Cloud
 
eFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCraft
eFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCrafteFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCraft
eFolder Webinar: How One Partner Leverages Dell AppAssure and StorageCraft
 
CA Security - Deloitte IAM Summit - Vasu
CA Security - Deloitte IAM Summit  - VasuCA Security - Deloitte IAM Summit  - Vasu
CA Security - Deloitte IAM Summit - Vasu
 

More from COMMON Europe

More from COMMON Europe (20)

What's New in WebSphere Application Server
What's New in WebSphere Application ServerWhat's New in WebSphere Application Server
What's New in WebSphere Application Server
 
Workload Groups overview updates
Workload Groups overview updatesWorkload Groups overview updates
Workload Groups overview updates
 
Why i - Common Europe 2012
Why i - Common Europe 2012Why i - Common Europe 2012
Why i - Common Europe 2012
 
The Ruby OpenSSL extension
The Ruby OpenSSL extensionThe Ruby OpenSSL extension
The Ruby OpenSSL extension
 
IBM i Trends & Directions Common Europe 2012
IBM i Trends & Directions Common Europe 2012IBM i Trends & Directions Common Europe 2012
IBM i Trends & Directions Common Europe 2012
 
IBM i Technology Refreshes Overview 2012 06-04
IBM i Technology Refreshes Overview 2012 06-04IBM i Technology Refreshes Overview 2012 06-04
IBM i Technology Refreshes Overview 2012 06-04
 
IBM i 7.1 & TRs CEC 2012
IBM i 7.1 & TRs CEC 2012IBM i 7.1 & TRs CEC 2012
IBM i 7.1 & TRs CEC 2012
 
DB2 Web Query whats new
DB2 Web Query whats newDB2 Web Query whats new
DB2 Web Query whats new
 
Access client solutions overview
Access client solutions overviewAccess client solutions overview
Access client solutions overview
 
RPG investment
RPG investmentRPG investment
RPG investment
 
Php arrays for RPG programmers
Php arrays for RPG programmersPhp arrays for RPG programmers
Php arrays for RPG programmers
 
Open source report writing tools for IBM i Vienna 2012
Open source report writing tools for IBM i  Vienna 2012Open source report writing tools for IBM i  Vienna 2012
Open source report writing tools for IBM i Vienna 2012
 
Introduction to My SQL
Introduction to My SQLIntroduction to My SQL
Introduction to My SQL
 
IBM CEC 2012 Storage june 11, 2012
IBM CEC 2012 Storage june 11, 2012IBM CEC 2012 Storage june 11, 2012
IBM CEC 2012 Storage june 11, 2012
 
Getting started with PHP on IBM i
Getting started with PHP on IBM iGetting started with PHP on IBM i
Getting started with PHP on IBM i
 
Developing mobile applications for i using open source tools Venna 2012
Developing mobile applications for i using open source tools  Venna 2012Developing mobile applications for i using open source tools  Venna 2012
Developing mobile applications for i using open source tools Venna 2012
 
DB2 for i 7.1 - Whats New?
DB2 for i 7.1 - Whats New?DB2 for i 7.1 - Whats New?
DB2 for i 7.1 - Whats New?
 
Common Europe SAP on i for beginners
Common Europe SAP on i for beginnersCommon Europe SAP on i for beginners
Common Europe SAP on i for beginners
 
Business value of PHP
Business value of PHPBusiness value of PHP
Business value of PHP
 
AD for i in modern world
AD for i in modern worldAD for i in modern world
AD for i in modern world
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 

Security considerations for the cloud

  • 1. www.skyviewpartners.com 6/7/2012 Carol Woodbury, President SkyView Partners, Inc. www.skyviewpartners.com @carolwoodbury (c) SkyView Partners, Inc, 2012. All Rights Reserved. 1 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 2 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 1
  • 2. www.skyviewpartners.com 6/7/2012 Benefits: However:  Hardware  Must meet  Support of the requirements of hardware security policy  Software licensing  Legal requirements  Software maintenance  Compliance requirements (c) SkyView Partners, Inc, 2012. All Rights Reserved. 3  Depends on the type of data (c) SkyView Partners, Inc, 2012. All Rights Reserved. 4 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 2
  • 3. www.skyviewpartners.com 6/7/2012  EU Data Protection Laws ◦ Currently being revised (c) SkyView Partners, Inc, 2012. All Rights Reserved. 5 Determines  Default access  Encryption requirements  Retention requirements  Storage requirements  Disposal method (both printed and online) While considering  Compliance requirements  Legal considerations (c) SkyView Partners, Inc, 2012. All Rights Reserved. 6 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 3
  • 4. www.skyviewpartners.com 6/7/2012  Data classification requirements don’t change just because the data is now in the cloud (c) SkyView Partners, Inc, 2012. All Rights Reserved. 7  Carefully plan the security and privacy aspects of cloud computing solutions before engaging them (a cloud provider.)  Understand the public cloud computing environment offered by the cloud provider.  Ensure that a cloud computing solution satisfies organizational security and privacy requirements.  Ensure that the client-side computing environment meets organizational security and privacy requirements for cloud computing.  Maintain accountability over the privacy and security of data and applications implemented and deployed in public cloud computing environments. (c) SkyView Partners, Inc, 2012. All Rights Reserved. 8 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 4
  • 5. www.skyviewpartners.com 6/7/2012  Encryption  Auditing (logging)  No passwords in cleartext  Access controls  Reporting  Incident response handling  What will a QSA or auditor say …? (c) SkyView Partners, Inc, 2012. All Rights Reserved. 9  Where is the data physically located  Incident response handling ◦ Do you and provider have the same definition of a breach?  Can your SLAs be fulfilled? ◦ (think disaster-recovery)  As well as compliance requirements (c) SkyView Partners, Inc, 2012. All Rights Reserved. 10 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 5
  • 6. www.skyviewpartners.com 6/7/2012  Questions for providers’ security practices: ◦ Is admin (root) power limited to only those users needing it? ◦ Who/What is logged? ◦ Do administrators access systems via encrypted sessions? ◦ What is the patch management strategy? ◦ What anti-virus / anti-malware software is used? ◦ Are the servers in compliance with  PCI  SOX  HIPAA ◦ Who are you audited by and can we see the results? (c) SkyView Partners, Inc, 2012. All Rights Reserved. 11  User management: ◦ Process to integrate with HR to remove access?  What about immediate removal for terminated employees/contractors? ◦ Password composition rules? ◦ Password change rules? (c) SkyView Partners, Inc, 2012. All Rights Reserved. 12 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 6
  • 7. www.skyviewpartners.com 6/7/2012  Logging: ◦ Invalid sign on attempts  Lock-out for excess attempts ◦ Reads and changes to HIPAA or PCI data ◦ Access attempts to data ◦ Retention of the logs ◦ Review of the logs  Network logging: ◦ Connections ◦ Data movement – what about DLP? (c) SkyView Partners, Inc, 2012. All Rights Reserved. 13  Because the service provider holds so much data, they may become a victim of a targeted attack  However … provider likely has ◦ Network monitoring ◦ Trained personnel to recognize and respond to the attack ◦ Knowledge / Hardware to prevent or limit the attack (c) SkyView Partners, Inc, 2012. All Rights Reserved. 14 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 7
  • 8. www.skyviewpartners.com 6/7/2012  Business level objectives  Responsibilities of both parties  Business continuity/disaster recovery  Redundancy  Maintenance  Data location  Data seizure  Provider failure  Jurisdiction  Brokers and resellers http://www.ibm.com/developerworks/cloud/library/cl- rev2sla.html?ca=drs- (c) SkyView Partners, Inc, 2012. All Rights Reserved. 15  Security  Incident response  Data encryption  Transparency  Privacy  Certification  Data retention and  Performance definitions deletion  Monitoring  Hardware erasure,  Auditability destruction  Metrics  Regulatory compliance  Human interaction (c) SkyView Partners, Inc, 2012. All Rights Reserved. 16 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 8
  • 9. www.skyviewpartners.com 6/7/2012  Determine your organization’s security and compliance requirements for the type of data going to the cloud  Put the appropriate SLA in place ◦ Terminology / Communication is key – make sure you agree to each others’ definitions  Monitor the results to determine if SLA is being met (c) SkyView Partners, Inc, 2012. All Rights Reserved. 17  Find your private and confidential data  Do not assume it doesn’t exist just because it’s not supposed to be a on specific server or in a specific database! (c) SkyView Partners, Inc, 2012. All Rights Reserved. 18 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 9
  • 10. www.skyviewpartners.com 6/7/2012  Many organizations are realizing the benefits of “private” clouds ◦ Reduced hardware / software costs ◦ Quicker patching ◦ Consolidated security expertise  Monitoring (NOC)  Recognition and response to incidents ◦ Consolidated logging (correlated events) ◦ More layers of security (depending on the data requirements) (c) SkyView Partners, Inc, 2012. All Rights Reserved. 19  Clouds specializing in meeting compliance needs: ◦ PCI ◦ HIPAA  Significantly more expensive but consider that with public clouds you ‘get what you pay for.’ (c) SkyView Partners, Inc, 2012. All Rights Reserved. 20 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 10
  • 11. www.skyviewpartners.com 6/7/2012  Service providers have been providing “cloud” services for many years ◦ Private / Specialized cloud – typically without the dynamic allocation of new resources  Security/Compliance/Legal requirements you make of them are the same as what we’ve been discussing. (c) SkyView Partners, Inc, 2012. All Rights Reserved. 21 Best practices and Certifications for Cloud Security  https://cloudsecurityalliance.org/ Guidelines on Security and Privacy in Public Cloud Computing – National Institute of Standards and Technology (NIST) SP 800-144  http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf Cloud Computing Synopsis and Recommendations - – National Institute of Standards and Technology (NIST) SP 800-146 – DRAFT  http://csrc.nist.gov/publications/drafts/800-146/Draft-NIST-SP800-146.pdf Articles:  www.sans.org  www.isaca.org  Search ‘European cloud Computing Strategy’ Contact us at: info@skyviewpartners.com @carolwoodbury (c) SkyView Partners, Inc, 2012. All Rights Reserved. 22 (c) SkyView Partners, Inc, 2012. All Rights Reserved. 11