SlideShare a Scribd company logo
Compliance in the Public Cloud
and the
Cloud Security Alliance's
Open Certification Framework
Dr David Ross
CISO, Bridge Point Communications
Founding Director, Cloud Security Alliance Australia Chapter
• Security issues encountered with cloud services
• Trust Issues
• Governance, Compliance, Control, Assurance and Certification
• Open Certification Framework
– STAR Certification
– STAR Attestation
2
A collaboration of a number of security experts
from the Cloud Security Alliance in Australia
Security issues encountered with cloud services
• #1 The Cloud Consumer assumes the Cloud Service is “secure” without
understanding the contract.
– Real Example: Cloud Service includes “automatic backup service that copies customer data
to an external backup service, providing a further level of security to customer data …
stored for 3 months after being made … can be extended to up to 7 years if required”
• Perfectly legitimate, but there are 2 meanings for “secure” here
– By default, the backup is overwritten after 3 months … no restores over 3 months old!
– The backups go to a third party … with whom you have no contract for handling your data!
– The backups are … NOT encrypted!
3
Copyright © 2013 Bridge Point Communications
Security issues encountered with cloud services
• #2 Insecure management or administration interfaces
– Real Example: Cloud Service uses insecure, clear-text protocol (HTTP) for
remote administration logins.
– The username and password are transmitted in clear-text and may be
intercepted by a network sniffer, relay, server logs, proxy or firewall logs, or
a man-in-the-middle attack to provide credentials for a subsequent attack.
4
Copyright © 2013 Bridge Point Communications
Security issues encountered with cloud services
• #3 No separation of duties, detection of abuse, or escalation of privilege
– Real Example: Cloud Service Systems Administrator has access to all layers,
from Application down to Physical hardware.
– The entire security of the Cloud Consumers’ data relies on the integrity and
expertise of a single person with no checks or balances to prevent malicious
or accidental compromise of security controls. The Systems Administrator
can do anything with the hosts, networks, and storage … including the audit
trails that detail just what has been done.
5
Copyright © 2013 Bridge Point Communications
Issues particular to cloud services in the GRC space
• #4 Weak, vague, or one-sided SLAs and contracts
– Real Example: “The following list presents an overview of some of the audits
and assessments that the” Cloud Service “undergoes on a regular basis”...
– The Cloud Service did indeed undergo regular audits … but only held
certifications for two of the five in their list in that year.
– Difference between ‘undergo audits’ and ‘meet requirements’.
– Require certification
6
Copyright © 2013 Bridge Point Communications
Impacts on the typical IT governance model
• Require a trust relationship with the Cloud Service Provider
• Require indirect administrative and contractual controls over the CSP in
place of the direct controls over in-house infrastructure and personnel
• Require transparency and assurance of the CSP operations
• Therefore -> Require independent verification of CSP assertions
7
Copyright © 2013 Bridge Point Communications
What are the Trust Issues?
8
Copyright © 2013 Bridge Point Communications
( I just ordered this from zazzle.com.au )
What are the Trust Issues?
• Will the CSP be transparent about governance and operational issues?
• Will the user be considered compliant?
• Does the user know what legislation applies?
• Will a lack of standards drive unexpected
obsolescence?
• Is cloud really better at security than
traditional IT solution?
9
Copyright © 2013 Cloud Security Alliance
A new Governance Model
• Users need to understand the shift in the balance of responsibility and
accountability for key functions such as governance and control over
data and IT operations, ensuring compliance with laws and regulations.
• Cloud computing requires a new model for assessing organisational risks
related to security and resilience.
10
Copyright © 2013 Cloud Security Alliance
Assurance
• Consumers do not have simple, cost effective ways to evaluate and
compare their providers’ resilience, data protection capabilities and
service portability.
11
Copyright © 2013 Cloud Security Alliance
Certification Challenges
• Provide a globally relevant certification to reduce duplication of efforts
• Address localised, national-state and regional compliance needs
• Address industry specific requirements
• Address different assurance requirements
• Address “certification staleness”
– assure provider is still secure after “point in time” certification
• Do all of the above while recognising the dynamic and fast changing world
that is cloud
12
Copyright © 2013 Cloud Security Alliance
Certification Challenges
This gap of trust mainly lies down in the difficulties of cloud users in addressing
fundamental assurance issues with cloud providers, such as:
• Understanding legal compliance and contractual liabilities,
• Defining and allocating responsibilities
• Enforcing accountability
• Translating requirements into cloud language/controls/checks
• Identifying means for an ex-ante analysis assessment of cloud services and for a
• Continuous monitoring of cloud service contract execution
13
Copyright © 2013 Cloud Security Alliance
How do we build Trust and Transparency?
• The Cloud Security Alliance’s Open Certification Framework for cloud
services
14
Copyright © 2013 Cloud Security Alliance
The Cloud Security Alliance’s Open Certification Framework
• Daniele Catteddu, CSA Managing Director EMEA
• Open Certification Framework for cloud services
• Announced 9May2012 Frankfurt (DE),detail 20Aug2012 Edinburgh (UK)
15
Copyright © 2013 Cloud Security Alliance
The Cloud Security Alliance (CSA)
• Global, not-for-profit organisation
• Over 40,000 individual members, more than
160 corporate members, over 60 chapters
• Building best practices and a trusted cloud
ecosystem
• Agile philosophy, rapid development of
applied research
16
Copyright © 2013 Cloud Security Alliance
The Cloud Security Alliance
– not-for-profitorganisation
with a mission…
“To promote the use of
best practices for providing
security assurance within
Cloud Computing, and
provide education on the
uses of Cloud Computing to
help secure all other forms
of computing.”
Open Certification Framework Vision Statement
• The CSA Open Certification Framework is an industry initiative to allow
global, accredited, trusted certification of cloud providers.
• The CSA Open Certification Framework is a program for flexible, incremental
and multi-layered cloud provider certification according to the Cloud
Security Alliance’s industry leading security guidance and control objectives.
• The program will integrate with popular third-party assessment and
attestation statements developed within the public accounting community
to avoid duplication of effort and cost.
~Jim Reavis & Daniele Catteddu; CSA~
17
Copyright © 2013 Cloud Security Alliance
OCF: The structure
• The open certification
framework is structured
on 3 LEVELs of TRUST,
each one of them
providing an incremental
level of visibility and
transparency into the
operations of the Cloud
Service Provider and a
higher level of assurance
to the Cloud consumer.
18
Copyright © 2013 Cloud Security Alliance
OCF Governance
19
Copyright © 2013 Cloud
Security Alliance
OCF Level 1: CSA STAR Registry
• CSA STAR (Security, Trust and Assurance Registry)
• Public Registry of Cloud Provider self assessments
• Based on Consensus Assessments Initiative Questionnaire
• Provider may substitute documented Cloud Controls Matrix compliance
• Voluntary industry action promoting transparency
• Free market competition to provide quality assessments
• Provider may elect to provide assessments from third parties
• Available since October 2011
20
Copyright © 2013 Cloud Security Alliance
OCF Level 2:
21
Copyright © 2013 Cloud Security Alliance
Certification
What is STAR Certification?
• Continuous monitoring of cloud service contract execution
• STAR CERTIFICATION evaluates the efficiency of an organization’s ISMS and ensures the scope,
processes and objectives are “Fit for Purpose.”
• Help organizations prioritize areas for improvement and lead them towards business excellence.
• Enables effective comparison across other organizations in the applicable sector.
• Focused on the strategic & operational business benefits as well as effective partnership relationships.
• Based upon the Plan, Do, Check, Act (PDCA) approach and the controls outlined in the Cloud Controls
Matrix (CCM)
• Enables the auditor to assess a company’s performance, on long-term sustainability and risks, in
addition to ensuring they are SLA driven, allowing senior management to quantify and measure
improvement year on year.
22
Copyright © 2013 Cloud Security Alliance
The Cloud Security Alliance’s STAR Certification
• The concept of the scheme is to use to the ISO/IEC 27001:2005 certification
integrated with the CSA Cloud Control Matrix (CCM) as additional or
compensating controls as applicable and the organisation’s own internal
requirements or specifications to assess how advanced their systems are.
• The scheme will be compliant with ISO 17021 and ISO 27006.
• Will be open to all 3rd party Certified Bodies (CB)
• Will be an additional scheme to the CB organisations internal ISO 27001
scheme requirements. It is not meant to be a replacement.
23
Copyright © 2013 Cloud Security Alliance
PDCA Model for an ISMS
24
Copyright © 2013 Cloud Security Alliance
STAR Certification
25
Copyright © 2013 Cloud Security Alliance
STAR Certification: the role of CCM
• The CCM is specifically designed to provide fundamental security
principles to guide cloud vendors and to assist prospective cloud
customers in assessing the overall security risk of a cloud provider.
• The Cloud Controls Matrix is meant to be integrated into the assessment
by the auditor, referencing the applicable CCM control to the associated
ISO 27001 controls (SOA) The output will be the result of the overall
performance of the organization within the scope of certification.
26
Copyright © 2013 Cloud Security Alliance
Benefits of STAR Certification
Sales and Marketing Benefits:
• Added to the current management system.
• A ISO 27001 certification plus a STAR certificate as evidence of both compliance and
performance to both suppliers, customers and other interested parties.
• The ability to benchmark your organization’s performance and gauge your
improvement from year to year.
• An independently validated report from an external Certified Body (CB) body which
can be used to demonstrate an organisation’s progress & performance levels.
• Exclusive to the STAR Registry.
27
Copyright © 2013 Cloud Security Alliance
Benefits of STAR Certification
Strategic Benefits:
• A 360º enhanced assessment giving senior management full visibility to evaluate the effectiveness of
both their management system and the roles and responsibilities of personnel within the organisation.
• A flexible assessment that can be tailored through the Statement of Applicability. This guarantees the
results and measurements of assessments are both relevant and necessary in helping organisations
manage their business.
• A comprehensive business report that goes beyond a usual assessment report and gives a strategic and
accurate overview of an organisations performance to enabling senior management to the identify
action areas needed.
• A set of improvement targets to encourage an organisation to move beyond compliance toward
continued improvement.
28
Copyright © 2013 Cloud Security Alliance
Benefits of STAR Certification
Operational Benefits:
• Scalable to organisations of all sizes. Provides information that allows you to know
where they are now and measure any improvements, internally benchmark their
sites and potentially externally benchmark their supply chain to stimulate healthy
competition.
• A visual representation of the status of a business and instantly highlights where the
strengths, weaknesses, allowing clients to maximize resources, improve operational
efficiencies and reduce costs
• Independent reassurance to prove to senior management where the risks, threats,
opportunities lie within a business
29
Copyright © 2013 Cloud Security Alliance
OCF Level 2:
30
Copyright © 2013 Cloud Security Alliance
Attestation
What is STAR Attestation?
Star Attestation (through the type 2 SOC attestation examination) helps companies meet the assessment
and reporting needs of the majority of users of cloud services, when the criteria for the engagement are
supplemented by the criteria in the CSA Cloud Controls Matrix (CCM). This assessment:
• Is based on a mature attest standard
• Allows for immediate adoption of the CCM as additional criteria and the flexibility to update the
criteria as technology and market requirements change
• Does not require the use of any criteria that were not designed for, or readily accepted by cloud
providers
• Provides for robust reporting on the service provider’s description of its system, and on the service
provider’s controls, including a description of the service auditor’s tests of controls in a format very
similar to the now obsolete SAS 70 reporting format, and current SSAE 16 (SOC 1) reporting, thereby
facilitating market acceptance
31
Copyright © 2013 Cloud Security Alliance
AICPA SOC Reporting Options
32
Copyright © 2013 Cloud Security Alliance
STAR Attestation
• SOC 2SM Report
• If the report will be used by customers and/or stakeholders to gain
confidence and place trust in a service organisation’s system:
• Need to understand the details of processing and controls at your
organisation, the tests performed & results of those tests?
33
Copyright © 2013 Cloud Security Alliance
SOC 2 (AT 101): Key strengths
• AT 101 is a mature attest standard (it serves as the standard for SOC 2 and
SOC 3 reporting )
• Provides for robust reporting on the service provider’s description of its
system, and on the service provider’s controls, including a description of the
service auditor’s tests of controls in a format very similar to the now
obsolete SAS 70 reporting format, and current SSAE 16 (SOC 1) reporting,
thereby facilitating market acceptance
• Evaluation over a period of time rather than a point in time
• Recognition with an AICPA Logo
34
Copyright © 2013 Cloud Security Alliance
Contact
Help Us Secure Cloud Computing:
• www.cloudsecurityalliance.org
• https://chapters.cloudsecurityalliance.org/australia/
• http://www.linkedin.com/groups?gid=3966724
• Archie Reed archer@hp.com
• David Ross David_Ross@bridgepoint.com.au
35
Copyright © 2013 Cloud Security Alliance
Thank You
36

More Related Content

What's hot

How to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud SecureHow to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud Secure
Cprime
 
Implementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloudImplementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloud
Ajit Bhingarkar
 
Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
Shankar Subramaniyan
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
CloudHesive
 
CSA Security Guidance Cloud Computing v3.0
CSA Security Guidance Cloud Computing v3.0CSA Security Guidance Cloud Computing v3.0
CSA Security Guidance Cloud Computing v3.0
CloudSecurityAllianceAustralia
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
Vladimir Jirasek
 
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
IISPEastMids
 
4.5.cloud security
4.5.cloud security4.5.cloud security
4.5.cloud security
DrRajapraveenkN
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
IJCNCJournal
 
Building a Security Architecture
Building a Security ArchitectureBuilding a Security Architecture
Building a Security Architecture
Cisco Canada
 
Cloud Security Guide - Ref Architecture and Gov. Model
Cloud Security Guide -  Ref Architecture and Gov. ModelCloud Security Guide -  Ref Architecture and Gov. Model
Cloud Security Guide - Ref Architecture and Gov. Model
Vishal Sharma
 
Workshop on CASB Part 2
Workshop on CASB Part 2Workshop on CASB Part 2
Workshop on CASB Part 2
Priyanka Aash
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
Amazon Web Services
 
IT Security As A Service
IT Security As A ServiceIT Security As A Service
IT Security As A Service
Michael Davis
 
How SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksHow SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze Networks
Articulate Marketing
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
RightScale
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Symosis Security (Previously C-Level Security)
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
Olav Tvedt
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Cisco Security
 
Content Strategy and Developer Engagement for DevPortals
Content Strategy and Developer Engagement for DevPortalsContent Strategy and Developer Engagement for DevPortals
Content Strategy and Developer Engagement for DevPortals
Axway
 

What's hot (20)

How to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud SecureHow to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud Secure
 
Implementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloudImplementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloud
 
Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
 
CSA Security Guidance Cloud Computing v3.0
CSA Security Guidance Cloud Computing v3.0CSA Security Guidance Cloud Computing v3.0
CSA Security Guidance Cloud Computing v3.0
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
 
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
 
4.5.cloud security
4.5.cloud security4.5.cloud security
4.5.cloud security
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
 
Building a Security Architecture
Building a Security ArchitectureBuilding a Security Architecture
Building a Security Architecture
 
Cloud Security Guide - Ref Architecture and Gov. Model
Cloud Security Guide -  Ref Architecture and Gov. ModelCloud Security Guide -  Ref Architecture and Gov. Model
Cloud Security Guide - Ref Architecture and Gov. Model
 
Workshop on CASB Part 2
Workshop on CASB Part 2Workshop on CASB Part 2
Workshop on CASB Part 2
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
 
IT Security As A Service
IT Security As A ServiceIT Security As A Service
IT Security As A Service
 
How SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksHow SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze Networks
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 
Content Strategy and Developer Engagement for DevPortals
Content Strategy and Developer Engagement for DevPortalsContent Strategy and Developer Engagement for DevPortals
Content Strategy and Developer Engagement for DevPortals
 

Similar to Compliance in Public Cloud & CSA Framework

The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
Eryk Budi Pratama
 
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
Alan Yau Ti Dun
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
Moshe Ferber
 
Ensuring PCI DSS Compliance in the Cloud
Ensuring PCI DSS Compliance in the CloudEnsuring PCI DSS Compliance in the Cloud
Ensuring PCI DSS Compliance in the Cloud
Cognizant
 
CCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overviewCCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overview
Peter HJ van Eijk
 
Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?
Clio - Cloud-Based Legal Technology
 
Cloud Security.ppt
Cloud Security.pptCloud Security.ppt
Cloud Security.ppt
AkashRajBehera
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
David Spinks
 
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
SafeNet
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Happiest Minds Technologies
 
chapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxchapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptx
GhofraneFerchichi2
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
promediakw
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Standards Customer Council
 
Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0
Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0
Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0
Cloud Standards Customer Council
 
Overcoming Operational & Financial Barriers to Cloud
Overcoming Operational & Financial Barriers to CloudOvercoming Operational & Financial Barriers to Cloud
Overcoming Operational & Financial Barriers to Cloud
Trustmarque
 
3.pptx
3.pptx3.pptx
Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013
David Linthicum
 
cloud Resilience
cloud Resilience cloud Resilience
cloud Resilience
Integral university, India
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Cloud Standards Customer Council
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
Armor
 

Similar to Compliance in Public Cloud & CSA Framework (20)

The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
Ensuring PCI DSS Compliance in the Cloud
Ensuring PCI DSS Compliance in the CloudEnsuring PCI DSS Compliance in the Cloud
Ensuring PCI DSS Compliance in the Cloud
 
CCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overviewCCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overview
 
Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?
 
Cloud Security.ppt
Cloud Security.pptCloud Security.ppt
Cloud Security.ppt
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
 
chapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxchapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptx
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0
Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0
Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0
 
Overcoming Operational & Financial Barriers to Cloud
Overcoming Operational & Financial Barriers to CloudOvercoming Operational & Financial Barriers to Cloud
Overcoming Operational & Financial Barriers to Cloud
 
3.pptx
3.pptx3.pptx
3.pptx
 
Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013
 
cloud Resilience
cloud Resilience cloud Resilience
cloud Resilience
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
 

Recently uploaded

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 

Recently uploaded (20)

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 

Compliance in Public Cloud & CSA Framework

  • 1. Compliance in the Public Cloud and the Cloud Security Alliance's Open Certification Framework Dr David Ross CISO, Bridge Point Communications Founding Director, Cloud Security Alliance Australia Chapter
  • 2. • Security issues encountered with cloud services • Trust Issues • Governance, Compliance, Control, Assurance and Certification • Open Certification Framework – STAR Certification – STAR Attestation 2 A collaboration of a number of security experts from the Cloud Security Alliance in Australia
  • 3. Security issues encountered with cloud services • #1 The Cloud Consumer assumes the Cloud Service is “secure” without understanding the contract. – Real Example: Cloud Service includes “automatic backup service that copies customer data to an external backup service, providing a further level of security to customer data … stored for 3 months after being made … can be extended to up to 7 years if required” • Perfectly legitimate, but there are 2 meanings for “secure” here – By default, the backup is overwritten after 3 months … no restores over 3 months old! – The backups go to a third party … with whom you have no contract for handling your data! – The backups are … NOT encrypted! 3 Copyright © 2013 Bridge Point Communications
  • 4. Security issues encountered with cloud services • #2 Insecure management or administration interfaces – Real Example: Cloud Service uses insecure, clear-text protocol (HTTP) for remote administration logins. – The username and password are transmitted in clear-text and may be intercepted by a network sniffer, relay, server logs, proxy or firewall logs, or a man-in-the-middle attack to provide credentials for a subsequent attack. 4 Copyright © 2013 Bridge Point Communications
  • 5. Security issues encountered with cloud services • #3 No separation of duties, detection of abuse, or escalation of privilege – Real Example: Cloud Service Systems Administrator has access to all layers, from Application down to Physical hardware. – The entire security of the Cloud Consumers’ data relies on the integrity and expertise of a single person with no checks or balances to prevent malicious or accidental compromise of security controls. The Systems Administrator can do anything with the hosts, networks, and storage … including the audit trails that detail just what has been done. 5 Copyright © 2013 Bridge Point Communications
  • 6. Issues particular to cloud services in the GRC space • #4 Weak, vague, or one-sided SLAs and contracts – Real Example: “The following list presents an overview of some of the audits and assessments that the” Cloud Service “undergoes on a regular basis”... – The Cloud Service did indeed undergo regular audits … but only held certifications for two of the five in their list in that year. – Difference between ‘undergo audits’ and ‘meet requirements’. – Require certification 6 Copyright © 2013 Bridge Point Communications
  • 7. Impacts on the typical IT governance model • Require a trust relationship with the Cloud Service Provider • Require indirect administrative and contractual controls over the CSP in place of the direct controls over in-house infrastructure and personnel • Require transparency and assurance of the CSP operations • Therefore -> Require independent verification of CSP assertions 7 Copyright © 2013 Bridge Point Communications
  • 8. What are the Trust Issues? 8 Copyright © 2013 Bridge Point Communications ( I just ordered this from zazzle.com.au )
  • 9. What are the Trust Issues? • Will the CSP be transparent about governance and operational issues? • Will the user be considered compliant? • Does the user know what legislation applies? • Will a lack of standards drive unexpected obsolescence? • Is cloud really better at security than traditional IT solution? 9 Copyright © 2013 Cloud Security Alliance
  • 10. A new Governance Model • Users need to understand the shift in the balance of responsibility and accountability for key functions such as governance and control over data and IT operations, ensuring compliance with laws and regulations. • Cloud computing requires a new model for assessing organisational risks related to security and resilience. 10 Copyright © 2013 Cloud Security Alliance
  • 11. Assurance • Consumers do not have simple, cost effective ways to evaluate and compare their providers’ resilience, data protection capabilities and service portability. 11 Copyright © 2013 Cloud Security Alliance
  • 12. Certification Challenges • Provide a globally relevant certification to reduce duplication of efforts • Address localised, national-state and regional compliance needs • Address industry specific requirements • Address different assurance requirements • Address “certification staleness” – assure provider is still secure after “point in time” certification • Do all of the above while recognising the dynamic and fast changing world that is cloud 12 Copyright © 2013 Cloud Security Alliance
  • 13. Certification Challenges This gap of trust mainly lies down in the difficulties of cloud users in addressing fundamental assurance issues with cloud providers, such as: • Understanding legal compliance and contractual liabilities, • Defining and allocating responsibilities • Enforcing accountability • Translating requirements into cloud language/controls/checks • Identifying means for an ex-ante analysis assessment of cloud services and for a • Continuous monitoring of cloud service contract execution 13 Copyright © 2013 Cloud Security Alliance
  • 14. How do we build Trust and Transparency? • The Cloud Security Alliance’s Open Certification Framework for cloud services 14 Copyright © 2013 Cloud Security Alliance
  • 15. The Cloud Security Alliance’s Open Certification Framework • Daniele Catteddu, CSA Managing Director EMEA • Open Certification Framework for cloud services • Announced 9May2012 Frankfurt (DE),detail 20Aug2012 Edinburgh (UK) 15 Copyright © 2013 Cloud Security Alliance
  • 16. The Cloud Security Alliance (CSA) • Global, not-for-profit organisation • Over 40,000 individual members, more than 160 corporate members, over 60 chapters • Building best practices and a trusted cloud ecosystem • Agile philosophy, rapid development of applied research 16 Copyright © 2013 Cloud Security Alliance The Cloud Security Alliance – not-for-profitorganisation with a mission… “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.”
  • 17. Open Certification Framework Vision Statement • The CSA Open Certification Framework is an industry initiative to allow global, accredited, trusted certification of cloud providers. • The CSA Open Certification Framework is a program for flexible, incremental and multi-layered cloud provider certification according to the Cloud Security Alliance’s industry leading security guidance and control objectives. • The program will integrate with popular third-party assessment and attestation statements developed within the public accounting community to avoid duplication of effort and cost. ~Jim Reavis & Daniele Catteddu; CSA~ 17 Copyright © 2013 Cloud Security Alliance
  • 18. OCF: The structure • The open certification framework is structured on 3 LEVELs of TRUST, each one of them providing an incremental level of visibility and transparency into the operations of the Cloud Service Provider and a higher level of assurance to the Cloud consumer. 18 Copyright © 2013 Cloud Security Alliance
  • 19. OCF Governance 19 Copyright © 2013 Cloud Security Alliance
  • 20. OCF Level 1: CSA STAR Registry • CSA STAR (Security, Trust and Assurance Registry) • Public Registry of Cloud Provider self assessments • Based on Consensus Assessments Initiative Questionnaire • Provider may substitute documented Cloud Controls Matrix compliance • Voluntary industry action promoting transparency • Free market competition to provide quality assessments • Provider may elect to provide assessments from third parties • Available since October 2011 20 Copyright © 2013 Cloud Security Alliance
  • 21. OCF Level 2: 21 Copyright © 2013 Cloud Security Alliance Certification
  • 22. What is STAR Certification? • Continuous monitoring of cloud service contract execution • STAR CERTIFICATION evaluates the efficiency of an organization’s ISMS and ensures the scope, processes and objectives are “Fit for Purpose.” • Help organizations prioritize areas for improvement and lead them towards business excellence. • Enables effective comparison across other organizations in the applicable sector. • Focused on the strategic & operational business benefits as well as effective partnership relationships. • Based upon the Plan, Do, Check, Act (PDCA) approach and the controls outlined in the Cloud Controls Matrix (CCM) • Enables the auditor to assess a company’s performance, on long-term sustainability and risks, in addition to ensuring they are SLA driven, allowing senior management to quantify and measure improvement year on year. 22 Copyright © 2013 Cloud Security Alliance
  • 23. The Cloud Security Alliance’s STAR Certification • The concept of the scheme is to use to the ISO/IEC 27001:2005 certification integrated with the CSA Cloud Control Matrix (CCM) as additional or compensating controls as applicable and the organisation’s own internal requirements or specifications to assess how advanced their systems are. • The scheme will be compliant with ISO 17021 and ISO 27006. • Will be open to all 3rd party Certified Bodies (CB) • Will be an additional scheme to the CB organisations internal ISO 27001 scheme requirements. It is not meant to be a replacement. 23 Copyright © 2013 Cloud Security Alliance
  • 24. PDCA Model for an ISMS 24 Copyright © 2013 Cloud Security Alliance
  • 25. STAR Certification 25 Copyright © 2013 Cloud Security Alliance
  • 26. STAR Certification: the role of CCM • The CCM is specifically designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider. • The Cloud Controls Matrix is meant to be integrated into the assessment by the auditor, referencing the applicable CCM control to the associated ISO 27001 controls (SOA) The output will be the result of the overall performance of the organization within the scope of certification. 26 Copyright © 2013 Cloud Security Alliance
  • 27. Benefits of STAR Certification Sales and Marketing Benefits: • Added to the current management system. • A ISO 27001 certification plus a STAR certificate as evidence of both compliance and performance to both suppliers, customers and other interested parties. • The ability to benchmark your organization’s performance and gauge your improvement from year to year. • An independently validated report from an external Certified Body (CB) body which can be used to demonstrate an organisation’s progress & performance levels. • Exclusive to the STAR Registry. 27 Copyright © 2013 Cloud Security Alliance
  • 28. Benefits of STAR Certification Strategic Benefits: • A 360º enhanced assessment giving senior management full visibility to evaluate the effectiveness of both their management system and the roles and responsibilities of personnel within the organisation. • A flexible assessment that can be tailored through the Statement of Applicability. This guarantees the results and measurements of assessments are both relevant and necessary in helping organisations manage their business. • A comprehensive business report that goes beyond a usual assessment report and gives a strategic and accurate overview of an organisations performance to enabling senior management to the identify action areas needed. • A set of improvement targets to encourage an organisation to move beyond compliance toward continued improvement. 28 Copyright © 2013 Cloud Security Alliance
  • 29. Benefits of STAR Certification Operational Benefits: • Scalable to organisations of all sizes. Provides information that allows you to know where they are now and measure any improvements, internally benchmark their sites and potentially externally benchmark their supply chain to stimulate healthy competition. • A visual representation of the status of a business and instantly highlights where the strengths, weaknesses, allowing clients to maximize resources, improve operational efficiencies and reduce costs • Independent reassurance to prove to senior management where the risks, threats, opportunities lie within a business 29 Copyright © 2013 Cloud Security Alliance
  • 30. OCF Level 2: 30 Copyright © 2013 Cloud Security Alliance Attestation
  • 31. What is STAR Attestation? Star Attestation (through the type 2 SOC attestation examination) helps companies meet the assessment and reporting needs of the majority of users of cloud services, when the criteria for the engagement are supplemented by the criteria in the CSA Cloud Controls Matrix (CCM). This assessment: • Is based on a mature attest standard • Allows for immediate adoption of the CCM as additional criteria and the flexibility to update the criteria as technology and market requirements change • Does not require the use of any criteria that were not designed for, or readily accepted by cloud providers • Provides for robust reporting on the service provider’s description of its system, and on the service provider’s controls, including a description of the service auditor’s tests of controls in a format very similar to the now obsolete SAS 70 reporting format, and current SSAE 16 (SOC 1) reporting, thereby facilitating market acceptance 31 Copyright © 2013 Cloud Security Alliance
  • 32. AICPA SOC Reporting Options 32 Copyright © 2013 Cloud Security Alliance
  • 33. STAR Attestation • SOC 2SM Report • If the report will be used by customers and/or stakeholders to gain confidence and place trust in a service organisation’s system: • Need to understand the details of processing and controls at your organisation, the tests performed & results of those tests? 33 Copyright © 2013 Cloud Security Alliance
  • 34. SOC 2 (AT 101): Key strengths • AT 101 is a mature attest standard (it serves as the standard for SOC 2 and SOC 3 reporting ) • Provides for robust reporting on the service provider’s description of its system, and on the service provider’s controls, including a description of the service auditor’s tests of controls in a format very similar to the now obsolete SAS 70 reporting format, and current SSAE 16 (SOC 1) reporting, thereby facilitating market acceptance • Evaluation over a period of time rather than a point in time • Recognition with an AICPA Logo 34 Copyright © 2013 Cloud Security Alliance
  • 35. Contact Help Us Secure Cloud Computing: • www.cloudsecurityalliance.org • https://chapters.cloudsecurityalliance.org/australia/ • http://www.linkedin.com/groups?gid=3966724 • Archie Reed archer@hp.com • David Ross David_Ross@bridgepoint.com.au 35 Copyright © 2013 Cloud Security Alliance