Cloud security strategy:
understanding and
evaluating the real risks
in the cloud
Lee Newcombe (lee.newcombe@capgemini.com)
Infrastructure Services
November 2012
Session Agenda

 Introduction                                                       5 minutes

 Presentation                                                       15 minutes
  “Securing Cloud Services”

 Facilitated Round Table Discussions                                20 minutes
  What are the genuine security issues that hold back Cloud adoption?
  Are services in the cloud less secure than those on-premise?
  How much of the threat is human (malicious or accidental), and how
   much IT, devices and hardware?
  What is the best way to manage security in a world of self‐service IT,
   mobile devices and social media?

 Sharing of outcomes from Discussions                               20 minutes


                                                                                                    12th Cloud Circle Forum

                                                                            Copyright © Capgemini 2012. All Rights Reserved   2
Agenda


             Introduction


             Establishing a common point of view


             Cloud Threats – who may attack your services?


         ?   Cloud Risks. And Benefits?


             An approach to secure adoption of cloud services


             Conclusions


                                                                                        12th Cloud Circle Forum

                                                                Copyright © Capgemini 2012. All Rights Reserved   3
The questions you asked…

 What are the genuine security issues that hold back Cloud adoption?
 Where do the main security threats come from and where should you focus
  your attention?
 Are services in the cloud less secure than those on-premise?
 How much of the threat is human (malicious or accidental), and how much IT,
  devices and hardware?
 Eliminating the human security risk: educating your workforce
 What is the best way to manage security in a world of self‐service IT,
  mobile devices and social media?
 How do emerging social business technologies complicate security strategies?




                                                                                     12th Cloud Circle Forum

                                                             Copyright © Capgemini 2012. All Rights Reserved   4
The ones I will tackle!

 What are the genuine security issues that hold back Cloud adoption?
 Where do the main security threats come from and where should you focus
  your attention?
 Are services in the cloud less secure than those on-premise?
 How much of the threat is human (malicious or accidental), and how much IT,
  devices and hardware?
 Eliminating the human security risk: educating your workforce
 What is the best way to manage security in a world of self‐service IT,
  mobile devices and social media?
 How do emerging social business technologies complicate security strategies?




                                                                                    12th Cloud Circle Forum

                                                            Copyright © Capgemini 2012. All Rights Reserved   5
Agenda


             Introduction


             Establishing a common point of view


             Cloud Threats – who may attack your services?


         ?   Cloud Risks. And Benefits?


             An approach to secure adoption of cloud services


             Conclusions


                                                                                        12th Cloud Circle Forum

                                                                Copyright © Capgemini 2012. All Rights Reserved   6
Cloud Computing – NIST


    Cloud Computing: “…a model for enabling ubiquitous, convenient, on-demand network
    access to a shared pool of configurable computing resources (e.g. networks, servers, storage,
    applications, and services) that can be rapidly provisioned and released with minimal
    management effort or service provider interaction…”




•            On-demand self-service
•            Broad network access
•            Resource pooling       Essential Characteristics
•            Rapid elasticity; and  of Cloud Computing
•            Measured service.
csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf




                                                                                                               12th Cloud Circle Forum

                                                                                       Copyright © Capgemini 2012. All Rights Reserved   7
Service Models




                                         12th Cloud Circle Forum

                 Copyright © Capgemini 2012. All Rights Reserved   8
NIST Deployment Models and Jericho Cloud Cube


Model       Strengths                  Weaknesses                     The Jericho Forum® Cloud Model represents
Public      Agile, cost-effective,     Multi-tenant                   an alternative mechanism to represent
            “Illusion of infinite      Data residency                 deployment models.
            resource”                  Assurance
                                       Standard contracts
Private     Dedicated use              Expensive cf Public
            Assurance                  No “illusion of infinite
            Scope to negotiate         resource”
            SLAs etc
Community   Designed for a specific,   Difficult to govern; need to
            shared, set of security    manage all stakeholders
            requirements
Hybrid      “Best of breed”            “Weakest link”
            suppliers can be           Must cater for security
            switched in and out.       issues across ALL suppliers    http://www.opengroup.org/jericho/cloud_cube_model_v1.0.pdf




                                                                                                                    12th Cloud Circle Forum

                                                                                            Copyright © Capgemini 2012. All Rights Reserved   9
Agenda


             Introduction


             Establishing a common point of view


             Cloud Threats – who may attack your services?


         ?   Cloud Risks. And Benefits?


             An approach to secure adoption of cloud services


             Conclusions


                                                                                        12th Cloud Circle Forum

                                                                Copyright © Capgemini 2012. All Rights Reserved   10
“Where do the main security threats come from and where should you focus
 your attention?” -> Cloud Threats




                                                                                        12th Cloud Circle Forum

                                                                Copyright © Capgemini 2012. All Rights Reserved   11
Agenda


             Introduction


             Establishing a common point of view


             Cloud Threats – who may attack your services?


         ?   Cloud Risks. And Benefits?


             An approach to secure adoption of cloud services


             Conclusions


                                                                                        12th Cloud Circle Forum

                                                                Copyright © Capgemini 2012. All Rights Reserved   12
“What are the genuine security issues that hold back Cloud adoption?”
-> Cloud Risks



                    Compliance



                    Multi-tenancy



                    Assurance



               ?    Supply chain – cloud, on cloud, on cloud, on…



                    Lock-in



                    Standard Terms and Conditions



                                                                                            12th Cloud Circle Forum

                                                                    Copyright © Capgemini 2012. All Rights Reserved   13
“Are services in the cloud less secure than those on-premise?” -> Cloud Benefits?




                     Cost-effective datacentre security



                     Improved resilience



                     More efficient security patching


                     Improved security expertise, including application-specific expertise, at the
               ?     centre


                     Cloud data storage and sharing vs removable media



                     Encourages adoption of Jericho principles



                                                                                                                 12th Cloud Circle Forum

                                                                                         Copyright © Capgemini 2012. All Rights Reserved   14
Agenda


             Introduction


             Establishing a common point of view


             Cloud Threats – who may attack your services?


         ?   Cloud Risks. And Benefits?


             An approach to secure adoption of cloud services


             Conclusions


                                                                                        12th Cloud Circle Forum

                                                                Copyright © Capgemini 2012. All Rights Reserved   15
“What is the best way to manage security in a world of self‐service IT, mobile devices and social
media?” -> Security Architecture




 “The fundamental
 security organization of a
 system, embodied in its
 components, their
 relationships to each
 other and the
 environment, and the
 security principles
 governing its design and
 evolution”
 Adapted from: ISO/IEC 42010:2007




                                                                                                     12th Cloud Circle Forum

                                                                             Copyright © Capgemini 2012. All Rights Reserved   16
Security Reference Model




                                                   12th Cloud Circle Forum

                           Copyright © Capgemini 2012. All Rights Reserved   17
Modelling Different Delivery Responsibilities

                                                     The delivery responsibilities for the security
                                                     services shifts from the consumer to the provider
                                                     as you move from IaaS to SaaS.




Interfaces between consumer and provider present a
risk of gaps in capability and poor/no/mis-
communication between provider and consumer.


                                                                                                  12th Cloud Circle Forum

                                                                          Copyright © Capgemini 2012. All Rights Reserved   18
Procurement Usage




                                            12th Cloud Circle Forum

                    Copyright © Capgemini 2012. All Rights Reserved   19
Agenda


             Introduction


             Establishing a common point of view


             Cloud Threats – who may attack your services?


         ?   Cloud Risks. And Benefits?


             An approach to secure adoption of cloud services


             Conclusions


                                                                                        12th Cloud Circle Forum

                                                                Copyright © Capgemini 2012. All Rights Reserved   20
Conclusions

 • All delivery models are unique. Cloud computing models have unique security challenges. So do other delivery models
 including on-premise and traditional outsourcing.
 • Cloud is an evolution not a revolution.
 • The threat actors remain mostly the same, cloud or on-premise
 • The risks remain mostly the same, whether your applications are hosted on-premise or on-cloud, however
       •   increased sharing of resources due to multi-tenancy introduces new attack surfaces
       •   assurance difficulties can cause compliance issues (data residency, data deletion, segregation etc)
 • Security architecture approach can help to enable cloud adoption.
       •   Architecture methodologies help to enforce consistency across an enterprise, no matter the IT delivery model.
       •   Architecture methodologies help to identify the security services required from a Provider
       •   Architecture helps to identify areas of overlap or interface (or confusion or omission) between Provider and
           Consumer
       •   Architecture helps to inform service procurement




                                                                                                                        12th Cloud Circle Forum

                                                                                                Copyright © Capgemini 2012. All Rights Reserved   21
Conclusions


 • What are the genuine security issues that hold back Cloud adoption?
       •   Compliance
       •   Assurance
 • Where do the main security threats come from and where should you focus your attention?
       •   The usual…
 • Are services in the cloud less secure than those on-premise?
       •   It depends!
 • How much of the threat is human (malicious or accidental), and how much IT, devices and hardware?
       •   Confidentiality? Human. Availability? Mixture.
 •What is the best way to manage security in a world of self‐service IT, mobile devices and social media?
       •   Adopt an architectural approach.




                                                                                                                        12th Cloud Circle Forum

                                                                                                Copyright © Capgemini 2012. All Rights Reserved   22
Session Agenda

 Introduction                                                       5 minutes

 Presentation                                                       15 minutes
  “Securing Cloud Services”

 Facilitated Round Table Discussions                                20 minutes
  What are the genuine security issues that hold back Cloud adoption?
  Are services in the cloud less secure than those on-premise?
  How much of the threat is human (malicious or accidental), and how
   much IT, devices and hardware?
  What is the best way to manage security in a world of self‐service IT,
   mobile devices and social media?

 Sharing of outcomes from Discussions                               20 minutes


                                                                                                    12th Cloud Circle Forum

                                                                            Copyright © Capgemini 2012. All Rights Reserved   23
About Capgemini
With more than 120,000 people in 40 countries, Capgemini is one
of the world's foremost providers of consulting, technology and
outsourcing services. The Group reported 2011 global revenues
of EUR 9.7 billion.
Together with its clients, Capgemini creates and delivers
business and technology solutions that fit their needs and drive
the results they want. A deeply multicultural organization,
Capgemini has developed its own way of working, the
Collaborative Business ExperienceTM, and draws on Rightshore ®,
its worldwide delivery model.
                                                                   www.capgemini.com

                                                                    The information contained in this presentation is proprietary.
                                                                            Rightshore® is a trademark belonging to Capgemini
                                                                                         © 2012 Capgemini. All rights reserved.

Cloud Security Strategy

  • 1.
    Cloud security strategy: understandingand evaluating the real risks in the cloud Lee Newcombe (lee.newcombe@capgemini.com) Infrastructure Services November 2012
  • 2.
    Session Agenda  Introduction 5 minutes  Presentation 15 minutes  “Securing Cloud Services”  Facilitated Round Table Discussions 20 minutes  What are the genuine security issues that hold back Cloud adoption?  Are services in the cloud less secure than those on-premise?  How much of the threat is human (malicious or accidental), and how much IT, devices and hardware?  What is the best way to manage security in a world of self‐service IT, mobile devices and social media?  Sharing of outcomes from Discussions 20 minutes 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 2
  • 3.
    Agenda Introduction Establishing a common point of view Cloud Threats – who may attack your services? ? Cloud Risks. And Benefits? An approach to secure adoption of cloud services Conclusions 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 3
  • 4.
    The questions youasked…  What are the genuine security issues that hold back Cloud adoption?  Where do the main security threats come from and where should you focus your attention?  Are services in the cloud less secure than those on-premise?  How much of the threat is human (malicious or accidental), and how much IT, devices and hardware?  Eliminating the human security risk: educating your workforce  What is the best way to manage security in a world of self‐service IT, mobile devices and social media?  How do emerging social business technologies complicate security strategies? 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 4
  • 5.
    The ones Iwill tackle!  What are the genuine security issues that hold back Cloud adoption?  Where do the main security threats come from and where should you focus your attention?  Are services in the cloud less secure than those on-premise?  How much of the threat is human (malicious or accidental), and how much IT, devices and hardware?  Eliminating the human security risk: educating your workforce  What is the best way to manage security in a world of self‐service IT, mobile devices and social media?  How do emerging social business technologies complicate security strategies? 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 5
  • 6.
    Agenda Introduction Establishing a common point of view Cloud Threats – who may attack your services? ? Cloud Risks. And Benefits? An approach to secure adoption of cloud services Conclusions 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 6
  • 7.
    Cloud Computing –NIST Cloud Computing: “…a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction…” • On-demand self-service • Broad network access • Resource pooling Essential Characteristics • Rapid elasticity; and of Cloud Computing • Measured service. csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 7
  • 8.
    Service Models 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 8
  • 9.
    NIST Deployment Modelsand Jericho Cloud Cube Model Strengths Weaknesses The Jericho Forum® Cloud Model represents Public Agile, cost-effective, Multi-tenant an alternative mechanism to represent “Illusion of infinite Data residency deployment models. resource” Assurance Standard contracts Private Dedicated use Expensive cf Public Assurance No “illusion of infinite Scope to negotiate resource” SLAs etc Community Designed for a specific, Difficult to govern; need to shared, set of security manage all stakeholders requirements Hybrid “Best of breed” “Weakest link” suppliers can be Must cater for security switched in and out. issues across ALL suppliers http://www.opengroup.org/jericho/cloud_cube_model_v1.0.pdf 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 9
  • 10.
    Agenda Introduction Establishing a common point of view Cloud Threats – who may attack your services? ? Cloud Risks. And Benefits? An approach to secure adoption of cloud services Conclusions 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 10
  • 11.
    “Where do themain security threats come from and where should you focus your attention?” -> Cloud Threats 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 11
  • 12.
    Agenda Introduction Establishing a common point of view Cloud Threats – who may attack your services? ? Cloud Risks. And Benefits? An approach to secure adoption of cloud services Conclusions 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 12
  • 13.
    “What are thegenuine security issues that hold back Cloud adoption?” -> Cloud Risks Compliance Multi-tenancy Assurance ? Supply chain – cloud, on cloud, on cloud, on… Lock-in Standard Terms and Conditions 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 13
  • 14.
    “Are services inthe cloud less secure than those on-premise?” -> Cloud Benefits? Cost-effective datacentre security Improved resilience More efficient security patching Improved security expertise, including application-specific expertise, at the ? centre Cloud data storage and sharing vs removable media Encourages adoption of Jericho principles 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 14
  • 15.
    Agenda Introduction Establishing a common point of view Cloud Threats – who may attack your services? ? Cloud Risks. And Benefits? An approach to secure adoption of cloud services Conclusions 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 15
  • 16.
    “What is thebest way to manage security in a world of self‐service IT, mobile devices and social media?” -> Security Architecture “The fundamental security organization of a system, embodied in its components, their relationships to each other and the environment, and the security principles governing its design and evolution” Adapted from: ISO/IEC 42010:2007 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 16
  • 17.
    Security Reference Model 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 17
  • 18.
    Modelling Different DeliveryResponsibilities The delivery responsibilities for the security services shifts from the consumer to the provider as you move from IaaS to SaaS. Interfaces between consumer and provider present a risk of gaps in capability and poor/no/mis- communication between provider and consumer. 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 18
  • 19.
    Procurement Usage 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 19
  • 20.
    Agenda Introduction Establishing a common point of view Cloud Threats – who may attack your services? ? Cloud Risks. And Benefits? An approach to secure adoption of cloud services Conclusions 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 20
  • 21.
    Conclusions • Alldelivery models are unique. Cloud computing models have unique security challenges. So do other delivery models including on-premise and traditional outsourcing. • Cloud is an evolution not a revolution. • The threat actors remain mostly the same, cloud or on-premise • The risks remain mostly the same, whether your applications are hosted on-premise or on-cloud, however • increased sharing of resources due to multi-tenancy introduces new attack surfaces • assurance difficulties can cause compliance issues (data residency, data deletion, segregation etc) • Security architecture approach can help to enable cloud adoption. • Architecture methodologies help to enforce consistency across an enterprise, no matter the IT delivery model. • Architecture methodologies help to identify the security services required from a Provider • Architecture helps to identify areas of overlap or interface (or confusion or omission) between Provider and Consumer • Architecture helps to inform service procurement 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 21
  • 22.
    Conclusions • Whatare the genuine security issues that hold back Cloud adoption? • Compliance • Assurance • Where do the main security threats come from and where should you focus your attention? • The usual… • Are services in the cloud less secure than those on-premise? • It depends! • How much of the threat is human (malicious or accidental), and how much IT, devices and hardware? • Confidentiality? Human. Availability? Mixture. •What is the best way to manage security in a world of self‐service IT, mobile devices and social media? • Adopt an architectural approach. 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 22
  • 23.
    Session Agenda  Introduction 5 minutes  Presentation 15 minutes  “Securing Cloud Services”  Facilitated Round Table Discussions 20 minutes  What are the genuine security issues that hold back Cloud adoption?  Are services in the cloud less secure than those on-premise?  How much of the threat is human (malicious or accidental), and how much IT, devices and hardware?  What is the best way to manage security in a world of self‐service IT, mobile devices and social media?  Sharing of outcomes from Discussions 20 minutes 12th Cloud Circle Forum Copyright © Capgemini 2012. All Rights Reserved 23
  • 24.
    About Capgemini With morethan 120,000 people in 40 countries, Capgemini is one of the world's foremost providers of consulting, technology and outsourcing services. The Group reported 2011 global revenues of EUR 9.7 billion. Together with its clients, Capgemini creates and delivers business and technology solutions that fit their needs and drive the results they want. A deeply multicultural organization, Capgemini has developed its own way of working, the Collaborative Business ExperienceTM, and draws on Rightshore ®, its worldwide delivery model. www.capgemini.com The information contained in this presentation is proprietary. Rightshore® is a trademark belonging to Capgemini © 2012 Capgemini. All rights reserved.