Cloud Security Alliance: Assuring the future of Cloud ComputingSergio Loureiro, CSA founding membersergio@secludit.comIBM La Gaude, 23rd June 2010
About the Cloud Security AllianceGlobal, not-for-profit organizationInclusive membership, supporting broad spectrum of subject matter expertise: cloud experts, security, legal, compliance, virtualization, and on and on…We believe Cloud Computing has a robust future, we want to make it better“To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.”
Membership50+ Corporate Members12 non-profit affiliations10,000 individual members growing by 300/weekBroad Geographical DistributionWorking Group activities performed through individual membership class
Corporate Members
S-P-I FrameworkYou “RFP”security inSaaSSoftware as a ServiceYou buildsecurity inPaaSPlatform as a ServiceIaaSInfrastructure as a Service
Top Threats to Cloud Computing
Shared Technology Vulnerabilities
Data Loss / Data Leakage
Malicious Insiders
Interception or Hijacking of Traffic
Insecure APIs
Nefarious Use of Service
Unknown Risk Profile
Top Threats - Status
CSA Research ProjectsGo to www.cloudsecurityalliance.org/Research.html for Research dashboard and Working Group signup
CSA Guidance ResearchCloud ArchitecturePopular best practices for securing cloud computing13 Domains of concern – governing & operating groupingsFoundation for CSA researchGovernance and Enterprise Risk ManagementLegal and Electronic DiscoveryGoverning the CloudCompliance and AuditInformation Lifecycle ManagementPortability and InteroperabilitySecurity, Bus. Cont,, and Disaster RecoveryData Center OperationsIncident  Response, Notification, RemediationApplication SecurityOperating in the CloudEncryption and Key ManagementIdentity and Access ManagementVirtualizationGuidance > 100k downloads: cloudsecurityalliance.org/guidance
CSA Guidance Research - StatusCloud ArchitectureVer 2.1 released Dec 2009Ver 3 mid-20112010 focusTranslationsWiki formatPer domain whitepapers (not official guidance)Governance and Enterprise Risk ManagementLegal and Electronic DiscoveryGoverning the CloudCompliance and AuditInformation Lifecycle ManagementPortability and InteroperabilitySecurity, Bus. Cont,, and Disaster RecoveryData Center OperationsIncident  Response, Notification, RemediationApplication SecurityOperating in the CloudEncryption and Key ManagementIdentity and Access ManagementVirtualization
Guidance Highlights - GovernanceBest opportunity to secure cloud engagement is before procurement – contracts, SLAs, architectureKnow provider’s third parties, BCM/DR, financial viability, employee vettingIdentify data location when possiblePlan for provider termination & return of assetsPreserve right to auditReinvest provider cost savings into due diligence
Guidance Highlights - OperatingEncrypt data when possible, segregate key mgt from cloud providerAdapt secure software development lifecycleUnderstand provider’s patching, provisioning, protectionLogging, data exfiltration, granular customer segregationHardened VM imagesAssess provider IdM integration, e.g. SAML, OpenID
CSA Research ProjectsCloud Controls Matrix ToolTrusted Cloud InitiativeConsensus Assessments InitiativeCloud Metrics Research
ContactHelp us secure cloud computingwww.cloudsecurityalliance.orginfo@cloudsecurityalliance.orgLinkedIn: www.linkedin.com/groups?gid=1864210Twitter: @cloudsa
SummaryCloud Computing is real and transformationalChallenges for People, Process, Technology,  Organizations and CountriesBroad governance approach neededTactical fixes neededCombination of updating existing best practices and creating completely new best practicesAdapting controls into “all virtual” environment
Thank you!sergio@secludit.comBlog elastic-security.com, Twitter @elasticsecurity

Csa about-threats-june-2010-ibm

  • 1.
    Cloud Security Alliance:Assuring the future of Cloud ComputingSergio Loureiro, CSA founding membersergio@secludit.comIBM La Gaude, 23rd June 2010
  • 2.
    About the CloudSecurity AllianceGlobal, not-for-profit organizationInclusive membership, supporting broad spectrum of subject matter expertise: cloud experts, security, legal, compliance, virtualization, and on and on…We believe Cloud Computing has a robust future, we want to make it better“To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.”
  • 3.
    Membership50+ Corporate Members12non-profit affiliations10,000 individual members growing by 300/weekBroad Geographical DistributionWorking Group activities performed through individual membership class
  • 4.
  • 5.
    S-P-I FrameworkYou “RFP”securityinSaaSSoftware as a ServiceYou buildsecurity inPaaSPlatform as a ServiceIaaSInfrastructure as a Service
  • 6.
    Top Threats toCloud Computing
  • 7.
  • 8.
    Data Loss /Data Leakage
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
    CSA Research ProjectsGoto www.cloudsecurityalliance.org/Research.html for Research dashboard and Working Group signup
  • 16.
    CSA Guidance ResearchCloudArchitecturePopular best practices for securing cloud computing13 Domains of concern – governing & operating groupingsFoundation for CSA researchGovernance and Enterprise Risk ManagementLegal and Electronic DiscoveryGoverning the CloudCompliance and AuditInformation Lifecycle ManagementPortability and InteroperabilitySecurity, Bus. Cont,, and Disaster RecoveryData Center OperationsIncident Response, Notification, RemediationApplication SecurityOperating in the CloudEncryption and Key ManagementIdentity and Access ManagementVirtualizationGuidance > 100k downloads: cloudsecurityalliance.org/guidance
  • 17.
    CSA Guidance Research- StatusCloud ArchitectureVer 2.1 released Dec 2009Ver 3 mid-20112010 focusTranslationsWiki formatPer domain whitepapers (not official guidance)Governance and Enterprise Risk ManagementLegal and Electronic DiscoveryGoverning the CloudCompliance and AuditInformation Lifecycle ManagementPortability and InteroperabilitySecurity, Bus. Cont,, and Disaster RecoveryData Center OperationsIncident Response, Notification, RemediationApplication SecurityOperating in the CloudEncryption and Key ManagementIdentity and Access ManagementVirtualization
  • 18.
    Guidance Highlights -GovernanceBest opportunity to secure cloud engagement is before procurement – contracts, SLAs, architectureKnow provider’s third parties, BCM/DR, financial viability, employee vettingIdentify data location when possiblePlan for provider termination & return of assetsPreserve right to auditReinvest provider cost savings into due diligence
  • 19.
    Guidance Highlights -OperatingEncrypt data when possible, segregate key mgt from cloud providerAdapt secure software development lifecycleUnderstand provider’s patching, provisioning, protectionLogging, data exfiltration, granular customer segregationHardened VM imagesAssess provider IdM integration, e.g. SAML, OpenID
  • 20.
    CSA Research ProjectsCloudControls Matrix ToolTrusted Cloud InitiativeConsensus Assessments InitiativeCloud Metrics Research
  • 21.
    ContactHelp us securecloud computingwww.cloudsecurityalliance.orginfo@cloudsecurityalliance.orgLinkedIn: www.linkedin.com/groups?gid=1864210Twitter: @cloudsa
  • 22.
    SummaryCloud Computing isreal and transformationalChallenges for People, Process, Technology, Organizations and CountriesBroad governance approach neededTactical fixes neededCombination of updating existing best practices and creating completely new best practicesAdapting controls into “all virtual” environment
  • 23.

Editor's Notes

  • #6 The security approach and role varies depending on the delivery model
  • #15 SecureCloud – ISACA, ENISA, IEEE & CSA
  • #17 The CSA Guidance is our flagship research that provides a broad catalog of best practices. It contains 13 domains to address both broad governance and specific operational issues. This Guidance is used as a foundation for the other research projects in the following slides that relate to compliance.
  • #18 The CSA Guidance is our flagship research that provides a broad catalog of best practices. It contains 13 domains to address both broad governance and specific operational issues. This Guidance is used as a foundation for the other research projects in the following slides that relate to compliance.
  • #22 Do visit the websiteDo join the LinkedIn Groups – you will receive regular email updates