SlideShare a Scribd company logo
1 of 19
Cloud security: A matter of trust?
                 Dr Mark Ian Williams
                CEO, Muon Consulting
I wandered lonely as a cloud...

•   The academic, globe-trotting years:
     • 1992–1993: Parallel software for PET scanner images in Geneva Hospital
     • 1993–1998: Particle Physics PhD research at CERN for Lancaster University
     • 1998: Senior Software Developer at SLAC, Stanford, USA
     • 1998–2000: RA for QMUL and webmaster for BaBar experiment at SLAC
•   The stepping stone:
     • 2000–2001: Business idea development as RSE/PPARC Enterprise Fellow
•   And down to business:
     • 2001–2005: Web developer and accessibility consultant as CEO of Surfability
     • 2005–2009: Managed Extrasys cloud computing business for NG Bailey
     • 2009–Present: Cloud consultant, author and CEO of Muon Consulting
Benefits of cloud computing


•   Pay-as-you-go IT, online and on-demand
•   Operational versus capital expenditure
•   Less time spent administering non-core commodity IT systems internally
•   Faster development and deployment of business applications
•   Data storage and compute resources scale seamlessly with your business
•   Faster entry to new markets using cloud-based software delivery and
    content distribution services, and online application marketplaces
•   Fewer hardware assets and software licenses to track
•   Always use latest version of cloud-based software with no upgrade costs
•   Mobile services, online collaboration and remote access ‘out of the box’
Cloud computing concerns


• Public clouds are multi-tenanted and therefore open to your competitors
• Common business concerns include:
    • The inherent dependency upon internet access
    • The potential for vendor lock-in
    • Unexpected cloud service charges and internal costs
    • Contractual liability for services if SLAs are missed
• But surveys consistently reveal that data security and data privacy in
  public clouds are the primary concerns for businesses
• And data protection and data privacy are your organisation’s
  responsibility not your cloud provider’s
Horror stories like this don’t help...


• High profile cloud security breaches in 2011:
    • Sony: over a dozen data breaches affecting 100 million user records
    • Epsilon, a cloud-based email provider: estimated 60 million customer
      emails addresses breached
    • EMC’s RSA two-factor authentication system breached and SecurID data
      stolen, putting tens of thousands of their customers at risk
Source : http://www.informationweek.com/news/security/attacks/232301079
• But internal (non-cloud) networks can be breached too:
    • In a survey of USA-based SMBs 40% claim to have suffered a security
      breach due to unsafe web surfing
Source: http://www.gfi.com/page/97539
Security attack techniques


• Public and/or private clouds create more targets for security attacks
  like this, and your employees hold the keys to your data:
    • Physical theft of unencrypted laptops that may have copies of data or have
      browsers with saved passwords for accessing web applications
    • Hacking servers to access unencrypted passwords (e.g. SONY)
    • Spear-phishing – targeted email spoofing fraud (e.g. Epsilon and RSA)
    • Social engineering attacks via social media and personal webmail to gain
      access to web-based systems
    • Exploits of web browser vulnerabilities and apps on mobile devices
    • Downloads of backdoor Trojans, keystroke loggers and other malware
Risk mitigation in and out of clouds


• Minimise internal security breaches through education, user account
  management processes and security technologies such as two-factor
  authentication and identity federation (e.g. single sign-on)
• Involve your IT and legal departments throughout your cloud adoption
  programme, and consult and engage other stakeholders too
• Institute a strict device management regime and/or educate your
  employees how to use their devices securely
• Avoid data protection litigation by storing only non-sensitive data in
  public clouds unless the cloud/s are a safer place for all your data
• Reduce the risk of cloud security breaches by ensuring your providers
  have adequate controls verified by a reputable third party
Questioning cloud providers




          Cartoon by Dave Blazek - http://blog.shicloud.com/
Questions on systems and processes


• Do the cloud provider’s systems satisfy your internal requirements for
  governance and compliance?
• Do they follow any industry best practices for IT service management,
  such as the Information Technology Infrastructure Library (ITIL)?
• Do they have independently audited internal controls of IT systems and
  processes to ISAE 3402 (successor to SAS 70) specifications?
• Do they have ISO 27001 certification for their information security
  management system?
• Do they have favourable independent and verifiable online reviews and
  client endorsements?
Questions on data security


• Do your cloud providers support federated identity?
• How are your data stored, backed-up, encrypted and kept separate
  from other organisations’ data in the cloud?
• How and when are security tests performed, especially during service
  updates?
• How are the data centres secured physically?
• Who, including system administrators, has access to your data, and how
  are they vetted?
• How is data access controlled and logged?
• What happens to your data if a service agreement is terminated or if
  the provider’s business fails?
Related data questions

•   Who owns the data you store on the provider’s servers?
•   Where are your data and backups stored geographically?
•   Where is the provider based?
•   Do they have controlled facilities for making automated and authorised
    backups to other clouds, including private clouds?
•   Do they have flexible data retention facilities for regulatory purposes?
•   What are their standard procedures for responding to government inquiries
    and legal investigations of their customers’ data, and the costs to be
    incurred by individual customers being investigated?
•   What assurances that your data will not be compromised or seized if
    another customer of theirs is being investigated?
•   What is the provider’s disaster recovery plan?
Cloud control
Top tips for cloud control


• Classify your data in terms of sensitivity and business criticality and
  define roles and responsibilities for data protection
• Document your security and privacy requirements with clouds in mind
  before entering public clouds
• Extend your governance practices to cloud environments
• Configure your cloud systems to meet your requirements
• Consider compensating controls to work around any cloud security
  defects
• Revisit security and privacy issues throughout the system lifecycle
• Formulate an identity management system
More top tips for cloud control


• Choose cloud providers with transparent and adequate security
  processes and request evidence that they have effectively provisioned
  your systems in line with your controls
• Continually monitor and maintain your information systems, test their
  security and document your findings
• Review your existing security measures to take into account the client
  side of cloud services – e.g. web browser vulnerabilities and
  applications on mobile devices
The future of cloud security


• Further development and wider adoption of cloud security standards
• More use of hybrid clouds, which combine public and private clouds
• More use of virtual private clouds for sensitive data
• Independent and standardised security audits so similar providers can
  be compared like for like
Who do you trust?


• Renowned cloud providers?           • Your inhouse IT?
   • The clouds of Amazon, Google,       • Is your internal network a
     Microsoft and others have been        secure hosting environment
     hardened through surviving            for a private cloud exposed to
     continual hacking attempts            multiple devices etc?
   • Attract and employ the best         • Do your people have the
     security people                       necessary competencies?
   • Have the best and most up-to-       • Is your hardware and software
     date security hardware and            fit for purpose?
     software
Further information


• Online resources:
   • NIST: Guidelines on Security and Privacy in Public Cloud Computing
     http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909494
   • Cloud Security Alliance guidance document
     https://cloudsecurityalliance.org/research/security-guidance/
• ICAEW IT faculty guides:
   • ‘Cloud computing: A guide for business managers‘, by Barnaby Page
   • ‘Making the move to cloud computing’, by yours truly
Conclusion


• Cloud computing is a matter of trust
• But trust can be earned by cloud providers and you can manage and
  mitigate internal and external security risks
• Many public cloud providers know what they are doing and some will
  have the right answers to your questions
• There is a balance between the potential cost and productivity benefits
  of using public clouds versus the data security and privacy risks
• Could your business create a more trustworthy private cloud?
• Plan carefully with security in mind, and be vigilant, but don’t let the
  clouds pass by your window without taking a good look
Any questions?




         Cartoon by Dave Blazek - http://blog.shicloud.com/

             Contact me at miw@muon.co.uk

More Related Content

What's hot

Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
 
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaCybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaFaysal Ghauri
 
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control  (SOC 2) Compliance - KloudlearnService Organizational Control  (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - KloudlearnKloudLearn
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
Docker and Container Compliance
Docker and Container ComplianceDocker and Container Compliance
Docker and Container ComplianceControlCase
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? PECB
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StoryCloudLock
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Brad Deflin
 
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderCase Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderArmor
 
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersDon’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersMichael Davis
 
PCI DSS Compliance Checklist
PCI DSS Compliance ChecklistPCI DSS Compliance Checklist
PCI DSS Compliance ChecklistControlCase
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsIgnyte Assurance Platform
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...PECB
 
internal-cloud-audit-risk-guide
internal-cloud-audit-risk-guideinternal-cloud-audit-risk-guide
internal-cloud-audit-risk-guideSatchit Dokras
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Oddscentralohioissa
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...CSA Argentina
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formulaOracleIDM
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
 
Sunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera
 

What's hot (20)

Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaCybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabia
 
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control  (SOC 2) Compliance - KloudlearnService Organizational Control  (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - Kloudlearn
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Docker and Container Compliance
Docker and Container ComplianceDocker and Container Compliance
Docker and Container Compliance
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's Story
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
 
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderCase Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
 
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersDon’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
 
PCI DSS Compliance Checklist
PCI DSS Compliance ChecklistPCI DSS Compliance Checklist
PCI DSS Compliance Checklist
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
internal-cloud-audit-risk-guide
internal-cloud-audit-risk-guideinternal-cloud-audit-risk-guide
internal-cloud-audit-risk-guide
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
Sunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera Business & Technology Risk Consulting
Sunera Business & Technology Risk Consulting
 

Similar to Cloud Security: A matter of trust?

Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantageMoshe Ferber
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
How to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingDavid Strom
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2Anne Starr
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...Leif Davidsen
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think Uni Systems S.M.S.A.
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputationNikec Solutions
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectATMOSPHERE .
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfCiente
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Standards Customer Council
 

Similar to Cloud Security: A matter of trust? (20)

Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
How to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computing
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Presd1 10
Presd1 10Presd1 10
Presd1 10
 

Cloud Security: A matter of trust?

  • 1. Cloud security: A matter of trust? Dr Mark Ian Williams CEO, Muon Consulting
  • 2. I wandered lonely as a cloud... • The academic, globe-trotting years: • 1992–1993: Parallel software for PET scanner images in Geneva Hospital • 1993–1998: Particle Physics PhD research at CERN for Lancaster University • 1998: Senior Software Developer at SLAC, Stanford, USA • 1998–2000: RA for QMUL and webmaster for BaBar experiment at SLAC • The stepping stone: • 2000–2001: Business idea development as RSE/PPARC Enterprise Fellow • And down to business: • 2001–2005: Web developer and accessibility consultant as CEO of Surfability • 2005–2009: Managed Extrasys cloud computing business for NG Bailey • 2009–Present: Cloud consultant, author and CEO of Muon Consulting
  • 3. Benefits of cloud computing • Pay-as-you-go IT, online and on-demand • Operational versus capital expenditure • Less time spent administering non-core commodity IT systems internally • Faster development and deployment of business applications • Data storage and compute resources scale seamlessly with your business • Faster entry to new markets using cloud-based software delivery and content distribution services, and online application marketplaces • Fewer hardware assets and software licenses to track • Always use latest version of cloud-based software with no upgrade costs • Mobile services, online collaboration and remote access ‘out of the box’
  • 4. Cloud computing concerns • Public clouds are multi-tenanted and therefore open to your competitors • Common business concerns include: • The inherent dependency upon internet access • The potential for vendor lock-in • Unexpected cloud service charges and internal costs • Contractual liability for services if SLAs are missed • But surveys consistently reveal that data security and data privacy in public clouds are the primary concerns for businesses • And data protection and data privacy are your organisation’s responsibility not your cloud provider’s
  • 5. Horror stories like this don’t help... • High profile cloud security breaches in 2011: • Sony: over a dozen data breaches affecting 100 million user records • Epsilon, a cloud-based email provider: estimated 60 million customer emails addresses breached • EMC’s RSA two-factor authentication system breached and SecurID data stolen, putting tens of thousands of their customers at risk Source : http://www.informationweek.com/news/security/attacks/232301079 • But internal (non-cloud) networks can be breached too: • In a survey of USA-based SMBs 40% claim to have suffered a security breach due to unsafe web surfing Source: http://www.gfi.com/page/97539
  • 6. Security attack techniques • Public and/or private clouds create more targets for security attacks like this, and your employees hold the keys to your data: • Physical theft of unencrypted laptops that may have copies of data or have browsers with saved passwords for accessing web applications • Hacking servers to access unencrypted passwords (e.g. SONY) • Spear-phishing – targeted email spoofing fraud (e.g. Epsilon and RSA) • Social engineering attacks via social media and personal webmail to gain access to web-based systems • Exploits of web browser vulnerabilities and apps on mobile devices • Downloads of backdoor Trojans, keystroke loggers and other malware
  • 7. Risk mitigation in and out of clouds • Minimise internal security breaches through education, user account management processes and security technologies such as two-factor authentication and identity federation (e.g. single sign-on) • Involve your IT and legal departments throughout your cloud adoption programme, and consult and engage other stakeholders too • Institute a strict device management regime and/or educate your employees how to use their devices securely • Avoid data protection litigation by storing only non-sensitive data in public clouds unless the cloud/s are a safer place for all your data • Reduce the risk of cloud security breaches by ensuring your providers have adequate controls verified by a reputable third party
  • 8. Questioning cloud providers Cartoon by Dave Blazek - http://blog.shicloud.com/
  • 9. Questions on systems and processes • Do the cloud provider’s systems satisfy your internal requirements for governance and compliance? • Do they follow any industry best practices for IT service management, such as the Information Technology Infrastructure Library (ITIL)? • Do they have independently audited internal controls of IT systems and processes to ISAE 3402 (successor to SAS 70) specifications? • Do they have ISO 27001 certification for their information security management system? • Do they have favourable independent and verifiable online reviews and client endorsements?
  • 10. Questions on data security • Do your cloud providers support federated identity? • How are your data stored, backed-up, encrypted and kept separate from other organisations’ data in the cloud? • How and when are security tests performed, especially during service updates? • How are the data centres secured physically? • Who, including system administrators, has access to your data, and how are they vetted? • How is data access controlled and logged? • What happens to your data if a service agreement is terminated or if the provider’s business fails?
  • 11. Related data questions • Who owns the data you store on the provider’s servers? • Where are your data and backups stored geographically? • Where is the provider based? • Do they have controlled facilities for making automated and authorised backups to other clouds, including private clouds? • Do they have flexible data retention facilities for regulatory purposes? • What are their standard procedures for responding to government inquiries and legal investigations of their customers’ data, and the costs to be incurred by individual customers being investigated? • What assurances that your data will not be compromised or seized if another customer of theirs is being investigated? • What is the provider’s disaster recovery plan?
  • 13. Top tips for cloud control • Classify your data in terms of sensitivity and business criticality and define roles and responsibilities for data protection • Document your security and privacy requirements with clouds in mind before entering public clouds • Extend your governance practices to cloud environments • Configure your cloud systems to meet your requirements • Consider compensating controls to work around any cloud security defects • Revisit security and privacy issues throughout the system lifecycle • Formulate an identity management system
  • 14. More top tips for cloud control • Choose cloud providers with transparent and adequate security processes and request evidence that they have effectively provisioned your systems in line with your controls • Continually monitor and maintain your information systems, test their security and document your findings • Review your existing security measures to take into account the client side of cloud services – e.g. web browser vulnerabilities and applications on mobile devices
  • 15. The future of cloud security • Further development and wider adoption of cloud security standards • More use of hybrid clouds, which combine public and private clouds • More use of virtual private clouds for sensitive data • Independent and standardised security audits so similar providers can be compared like for like
  • 16. Who do you trust? • Renowned cloud providers? • Your inhouse IT? • The clouds of Amazon, Google, • Is your internal network a Microsoft and others have been secure hosting environment hardened through surviving for a private cloud exposed to continual hacking attempts multiple devices etc? • Attract and employ the best • Do your people have the security people necessary competencies? • Have the best and most up-to- • Is your hardware and software date security hardware and fit for purpose? software
  • 17. Further information • Online resources: • NIST: Guidelines on Security and Privacy in Public Cloud Computing http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909494 • Cloud Security Alliance guidance document https://cloudsecurityalliance.org/research/security-guidance/ • ICAEW IT faculty guides: • ‘Cloud computing: A guide for business managers‘, by Barnaby Page • ‘Making the move to cloud computing’, by yours truly
  • 18. Conclusion • Cloud computing is a matter of trust • But trust can be earned by cloud providers and you can manage and mitigate internal and external security risks • Many public cloud providers know what they are doing and some will have the right answers to your questions • There is a balance between the potential cost and productivity benefits of using public clouds versus the data security and privacy risks • Could your business create a more trustworthy private cloud? • Plan carefully with security in mind, and be vigilant, but don’t let the clouds pass by your window without taking a good look
  • 19. Any questions? Cartoon by Dave Blazek - http://blog.shicloud.com/ Contact me at miw@muon.co.uk