SlideShare a Scribd company logo
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied.
Cloud Security Knowledge and
Certifications
Presented by Scott Hogg, CTO GTRI
CCIE #5133, CISSP #4610, CCSP, CCSK, AWS CSA-Associate
Colorado CSA Fall Summit – 11/10/2016
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• Securing Cloud Services
– Cloud Security Standards and Guidelines
• Cloud Security Certifications
– Cloud Security Alliance (CSA) Certificate of Cloud
Security Knowledge (CCSK)
– (ISC)2 Certified Cloud Security Professional (CCSP)
Today’s Agenda
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• Cloud Service Security Concerns/Threats
• Cloud Service Provider Security Certifications
Cloud Security Concepts
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• A breach of the Cloud Service Provider’s infrastructure can lead to a
“Hyperjacking” even whereby many customer’s data is exposed
• Examples of CSP Data Breaches:
– Google failure March 2011 deletion of 150k Gmail info
– Code Spaces goes out of business in June 2014 after AWS hack
– Google Drive breach in July 2014 hyperlink vulnerability
– Apple iCloud exposure of celebrity photos, August 2014
– Dropbox security breach in October 2014, compromising 7M user
passwords held for Bitcoin (BTC) ransom
– Worcester Polytechnic Institute (WPI) claims cross-VM RSA key
recovery in AWS, October 2015
– Datadog password breach for their AWS customers in July 2016
Concern About CSP Security
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• Cloud Security Alliance (CSA) provides advice for
securing cloud computing environments
• CSA is a US Federal 501(c)6 not-for-profit org, formed in
late 2008, now has over 48,000 members
• Mission = “promote the use of best practices for
providing security assurance within Cloud Computing,
and to provide education on the uses of Cloud
Computing to help secure all other forms of computing”
• https://cloudsecurityalliance.org/
Cloud Security Alliance (CSA)
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• CSA stated that the top three cloud computing threats are Insecure
Interfaces and API's, Data Loss & Leakage, and Hardware Failure.
• CSA’s Top 7 Security Threats (March 2010)
– https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
• In February 2013, the CSA published their “The Notorious Nine” cloud
computing top threats
– https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notor
ious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
CSA – The Notorious Nine
1. Data Breaches
2. Data Loss
3. Account or Service Traffic
Hijacking
4. Insecure Interfaces and APIs
5. Denial of Service (DoS)
6. Malicious Insiders
7. Abuse of Cloud Services
8. Insufficient Due Diligence
9. Shared Technology Vulnerabilities
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• CSA published their newest Top 12 cloud computing
threats at 2016 RSA conference
• Threat No. 1: Data breaches
• Threat No. 2: Compromised credentials and broken
authentication
• Threat No. 3: Hacked interfaces and APIs
• Threat No. 4: Exploited system vulnerabilities
• Threat No. 5: Account hijacking
• Threat No. 6: Malicious insiders
CSA Treacherous 12 (or the Dirty Dozen)
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• Threat No. 7: The APT parasite
• Threat No. 8: Permanent data loss
• Threat No. 9: Inadequate diligence
• Threat No. 10: Cloud service abuses
• Threat No. 11: DoS attacks
• Threat No. 12: Shared technology, shared dangers
CSA Treacherous 12 (or the Dirty Dozen)
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• Customer bears more responsibility with IaaS than SaaS
Cloud Security Responsibility – A Sliding Scale
IaaS PaaS SaaS
Security GRC
Data Security
App Security
Platform Security
Infrastructure Security
Physical Security
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• Cloud Service Providers (CSPs) can obtain certifications
attesting their compliance with security standards.
– SOC 1/SSAE 16/ISAE 3402, SOC2, SOC3 American Institute of
Certified Public Accountants (AICPA) audit reports may be
requested from the provider.
– International Organization for Standardization (ISO) 27001
– Cloud Security Alliance (CSA) Security, Trust & Assurance Registry
(STAR)
– U.S. Health Insurance Portability and Accountability Act (HIPAA)
– Payment Card Industry (PCI) Data Security Standard (DSS) Level 1
service provider
– Motion Picture Association of America (MPAA)
Cloud Compliance Assurance
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• American Institute of Certified Public Accountants (AICPA)
– Wants to make sure organizations are using reliable and secure
services that their business relies upon
– Compliance with Sarbanes Oxley's (SOX) requirement (section
404)
• Statement on Auditing Standards No. 70 (SAS 70)
• Statement on Standards for Attestation Engagements (SSAE)
16
– American standard that replaces SAS 70
– Similar to the International standard ISAE 3402
– Service Organization Controls (SOC) 1, 2, & 3
– http://ssae16.com/SSAE16_overview.html
AICPA SSAE16 SOC 1/2/3
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• Service availability is a critical component of any cloud service
• CSPs operate within data centers that they may own and manage or
collocate their systems
• The Uptime Institute provides a “Tier Certification System” for assessing
critical data center infrastructure to promote increased availability
• Data Center Site Infrastructure Tier Standard: Topology
– Tier I: Basic Site Infrastructure
– Tier II: Redundant Site Infrastructure Capacity Components
– Tier III: Concurrently Maintainable Site Infrastructure
– Tier IV: Fault Tolerant Site Infrastructure
• Check the tier rating of your current data center or cloud provider
– https://uptimeinstitute.com/TierCertification/
– https://uptimeinstitute.com/TierCertification/certMaps.php
The Uptime Institute Tier Standard: Topology
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• ISO/IEC 27001:2013
– Information Security Management System (ISMS)
• ISO/IEC 17788:2014
– Information technology -- Cloud computing --
Overview and vocabulary
• ISO/IEC 17789:2014
– Information technology -- Cloud computing --
Reference architecture
ISO/IEC Cloud Security Standards
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• U.S. Federal organizations have specialized requirements for
secure cloud services.
• Civilian and DOD organizations may have to meet NIST 800-
37 and DoD Information Assurance Certification and
Accreditation Process (DIACAP) and Federal Information
Security Management Act (FISMA) compliance.
• Cloud providers may also be required to meet US
International Traffic in Arms Regulations (ITAR) compliance.
• Federal customers also need to have FIPS 140-2 security
systems running in the cloud.
• Federal Risk and Authorization Management Program
(FedRAMP) certified cloud providers are required.
U.S. Federal Cloud Security Requirements
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• The OMB requires federal agencies to use FedRAMP (Federal Risk and Authorization
Management Program) accredited cloud services for FIPS 199 Low and Moderate
system categories (Based on FISMA and NIST 800-53 Rev3 standards)
– http://www.FedRAMP.gov
• FedRAMP established the Joint Authorization Board (JAB) to approve cloud services
and monitor the process
• The JAB defines the standards by which Third Party Assessment Organizations
(3PAOs) will assess the cloud providers
• Third Party Accreditation Organizations (3PAOs) include: Coalfire, Kratos SecureInfo,
Veris Group, among others
– https://www.fedramp.gov/marketplace/accredited-3paos/
• FedRAMP Provisional Authority To Operate (ATO) issued by the JAB (after review of
security assessment package) to the federal agency consuming the cloud services
• List of FedRAMP Compliant Systems
– https://www.fedramp.gov/marketplace/compliant-systems/
FedRAMP
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• NIST Cloud Computing Public Security Working Group
• NIST SP 500-292
– NIST Cloud Computing Reference Architecture
• NIST SP 500-293
– US Government Cloud Computing Technology Roadmap Volume 1, 2 & 3
• NIST SP 500-299
– NIST Cloud Computing Security Reference Architecture
• NIST SP 800-144
– Guidelines on Security and Privacy in Public Cloud Computing
• NIST SP 800-145
– The NIST Definition of Cloud Computing
• NIST SP 800-146
– Cloud Computing Synopsis and Recommendations
NIST Guidelines on Cloud Security
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• CSA’s CCM is a gigantic spreadsheet that lists over 130
prominent control specifications across 15 control domains
and relates each to pertinent cloud security standards and
best practices
• Mappings for FedRAMP Low/Moderate, ISO/IEC 27001, NIST
800-53, among others
• This is a valuable resource to help remind you of all the
controls to consider when operating in a cloud environment
• Cloud Controls Matrix (CCM) v3.0.1 (6-6-16 Update)
– https://cloudsecurityalliance.org/group/cloud-controls-matrix/
– https://cloudsecurityalliance.org/download/cloud-controls-matrix-
v3-0-1/
CSA Cloud Controls Matrix (CCM)
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
CSA Cloud Controls Matrix (CCM)
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• Customers want to evaluate their CSPs against their
requirements and select the best provider
• Consider the CSPs position when they receive numerous
individual separate security questionnaires and assessments
from customers
• The CAIQ provides a standard template that answers most
customer queries for information
– 300-line spreadsheet that can help streamline CSP evaluation
– https://cloudsecurityalliance.org/download/consensus-
assessments-initiative-questionnaire-v3-0-1/
Consensus Assessments Initiative Questionnaire
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
Consensus Assessments Initiative Questionnaire
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• The CSA created the STAR certification for CSPs
• The STAR certification rates the CSP based on their adherence
and adoption to cloud security best practices and controls
• CSA STAR is based on the CSA’s Cloud Controls Matrix (CCM)
and the Consensus Assessments Initiative Questionnaire
(CAIQ)
• CSA STAR program provides a complimentary registry for CSPs
– https://cloudsecurityalliance.org/star/#_registry
• There are 3 levels of assurance
CSA Security Trust & Assurance Registry (STAR)
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• https://cloudsecurityalliance.org/star/
CSA Security Trust & Assurance Registry (STAR)
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• CSA CCSK
• (ISC)2 CCSP
Cloud Security Certifications
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• The CSA created a certification for individuals
• The CCSK validates that an individual has the
understanding and skills to help protect an organization
who is consuming cloud services
• The CCSK shows you the best practices and things to
consider when protecting cloud-based assets
• The CCSK domains provide a holistic cloud security
controls framework
– https://cloudsecurityalliance.org/education/ccsk/
Certificate of Cloud Security Knowledge
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• CCSK Guidance V3 has 14 domains
CCSK Body of Knowledge Domains
1. Cloud Architecture
2. Governance and Enterprise
Risk
3. Legal and Electronic Discovery
4. Compliance and Audit
5. Information Lifecycle
Management
6. Portability and Interoperability
7. Traditional Security, BCM, D/R
8. Data Center Operations
9. Incident Response
10. Application Security
11. Encryption and Key
Management
12. Identity and Access
Management
13. Virtualization
14. Security-as-a-Service
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• CCSK Training Classes are available (HP Education
Services)
– CCSK Foundation (2 days), CCSK Plus (3 days)
• CSA guidance version 3.0, Security Guidance for Critical
Areas of Focus in Cloud Computing, V3 (92% of test)
• European Network and Information Security Agency
(ENISA) whitepaper (8% of test)
– Cloud Computing: Benefits, Risks and Recommendations
for Information Security
• NIST documents (800-144, 800-145, 800-146, 500-292)
Preparing for the CCSK
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• Read the v3 FAQ and the v3 Prep guide
– https://downloads.cloudsecurityalliance.org/ccsk/CCS
K_FAQ_v3.pdf
– https://cloudsecurityalliance.org/wp-
content/uploads/2013/02/CCSK-Prep-Guide-V3.pdf
• CCSK online open-book exam costs $345
– 60 questions, 90 minutes, >80% to pass, 2 attempts
• https://ccsk.cloudsecurityalliance.org/
Taking the CCSK Exam
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• CCSK can be used for CPEs for other certs
• CSA drafted CSA Guidance version 4.0 (GitHub)
– https://github.com/cloudsecurityalliance/CSA-
Guidance
• CCSK version 4 (coming soon)
• CCSK Developer certification (in the works)
• CCSK Assurance certification (in the works)
What’s Next for the CCSK?
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• CSA and ISC2 collaborated on developing a new
cloud certification that builds upon the CCSK
Certified Cloud Security Professional (CCSP) – (ISC)2
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• The CCSP Common Body of Knowledge (CBK) consists of
the following six domains:
– 1 Architectural Concepts & Design Requirements
– 2 Cloud Data Security
– 3 Cloud Platform & Infrastructure Security
– 4 Cloud Application Security
– 5 Operations
– 6 Legal & Compliance
• ISO/IEC 17788 and NIST 800-145, 800-146, 500-299
• https://www.isc2.org/ccsp/default.aspx
Certified Cloud Security Professional (CCSP) – (ISC)2
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• Live In-Person CBK Training Class, 5 days, $1995
• Live On-Line CBK Training Class, 5 days, $1395
• On-Demand On-Line CBK Training - $495 ($395 for CISSPs)
• The Official (ISC)2 Guide to the CCSP CBK, by Adam Gordon
– ISBN: 978-1-119-20749-8, 560 pages, November 2015
– http://www.wiley.com/WileyCDA/WileyTitle/productCd-
1119207495.html
– $80, Members get 50% off with code ISC50
• Free Flash Cards On-Line
• Pearson VUE Computer-Based Exam
– 4 hours, 125 questions (>700/1000) - $549
Certified Cloud Security Professional (CCSP) – (ISC)2
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
Cloud Security Summary
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• Security has more to do with people and processes than
technology. Good security comes down to discipline.
• If you have good InfoSec hygiene in your on-premises IT
infrastructure, you can have good cloud security operations.
• Cloud services can be less secure, equally secure, or more
secure than your traditional on-premises data center.
• It is easier to be secure from the beginning rather than try to
add security in after systems are in production.
• Good design, implementation using best practices, proper
maintenance, and vigilance will make your cloud system
secure.
• We encourage you to achieve cloud security certification to
validate your understanding of the topic area.
Cloud Security – The Bottom Line
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied.
Thank You For Your Time!
Scott Hogg, CTO GTRI
303-949-4865 | SHogg@gtri.com | @ScottHogg

More Related Content

What's hot

Security assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP PrepSecurity assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP Prep
EnterpriseGRC Solutions, Inc.
 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
Cohesive Networks
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
Priyanka Aash
 
How to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationHow to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organization
Exigent Technologies LLC
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Phil Agcaoili
 
Gpc case study_eng_0221
Gpc case study_eng_0221Gpc case study_eng_0221
Gpc case study_eng_0221
SALIH AHMED ISLAM
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data Breach
Anchises Moraes
 
Cybersecurity Framework - What are Pundits Saying?
Cybersecurity Framework - What are Pundits Saying?Cybersecurity Framework - What are Pundits Saying?
Cybersecurity Framework - What are Pundits Saying?
Jim Meyer
 
Top 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureTop 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure Infrastructure
Infosec
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
Tuan Phan
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
Erick Kish, U.S. Commercial Service
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Ignyte Assurance Platform
 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
Health IT Conference – iHT2
 
Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyUtilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare Technology
EnclaveSecurity
 
Does audit make us more secure
Does audit make us more secureDoes audit make us more secure
Does audit make us more secure
EnterpriseGRC Solutions, Inc.
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
McKonly & Asbury, LLP
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Phil Agcaoili
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controls
EnclaveSecurity
 
Cyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its AnalysisCyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its Analysis
Rahul Neel Mani
 

What's hot (20)

Security assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP PrepSecurity assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP Prep
 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
How to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationHow to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organization
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
 
Gpc case study_eng_0221
Gpc case study_eng_0221Gpc case study_eng_0221
Gpc case study_eng_0221
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data Breach
 
Cybersecurity Framework - What are Pundits Saying?
Cybersecurity Framework - What are Pundits Saying?Cybersecurity Framework - What are Pundits Saying?
Cybersecurity Framework - What are Pundits Saying?
 
Top 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureTop 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure Infrastructure
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
 
Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyUtilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare Technology
 
Does audit make us more secure
Does audit make us more secureDoes audit make us more secure
Does audit make us more secure
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controls
 
Cyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its AnalysisCyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its Analysis
 

Similar to Scott Hogg - Gtri cloud security knowledge and certs

IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET Journal
 
Presd1 10
Presd1 10Presd1 10
Presd1 10
Niels Groeneveld
 
CompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and TricksCompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and Tricks
Joseph Holbrook, Chief Learning Officer (CLO)
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptx
NguyenNM
 
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
Danny Miller
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
UnifyCloud
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
TrongMinhHoang1
 
IRJET- Data and Technical Security Issues in Cloud Computing Databases
IRJET- Data and Technical Security Issues in Cloud Computing DatabasesIRJET- Data and Technical Security Issues in Cloud Computing Databases
IRJET- Data and Technical Security Issues in Cloud Computing Databases
IRJET Journal
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
Cisco Canada
 
A5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloudA5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloud
Dr. Wilfred Lin (Ph.D.)
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
IRJET Journal
 
Cloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit PlanningCloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit Planning
Valdez Ladd MBA, CISSP, CISA,
 
AWS Security Week: Why Your Customers Care About Compliance
AWS Security Week: Why Your Customers Care About ComplianceAWS Security Week: Why Your Customers Care About Compliance
AWS Security Week: Why Your Customers Care About Compliance
Amazon Web Services
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Amazon Web Services
 
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp
 
Securing the Foundation to Secure the Cloud
Securing the Foundation to Secure the CloudSecuring the Foundation to Secure the Cloud
Securing the Foundation to Secure the Cloud
Trent Adams
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same Coin
Zivaro Inc
 

Similar to Scott Hogg - Gtri cloud security knowledge and certs (20)

IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud Environment
 
Presd1 10
Presd1 10Presd1 10
Presd1 10
 
CompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and TricksCompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and Tricks
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptx
 
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
 
IRJET- Data and Technical Security Issues in Cloud Computing Databases
IRJET- Data and Technical Security Issues in Cloud Computing DatabasesIRJET- Data and Technical Security Issues in Cloud Computing Databases
IRJET- Data and Technical Security Issues in Cloud Computing Databases
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
A5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloudA5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloud
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
Cloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit PlanningCloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit Planning
 
AWS Security Week: Why Your Customers Care About Compliance
AWS Security Week: Why Your Customers Care About ComplianceAWS Security Week: Why Your Customers Care About Compliance
AWS Security Week: Why Your Customers Care About Compliance
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
 
Securing the Foundation to Secure the Cloud
Securing the Foundation to Secure the CloudSecuring the Foundation to Secure the Cloud
Securing the Foundation to Secure the Cloud
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same Coin
 

More from Trish McGinity, CCSK

Csa privacy by design & gdpr austin chambers 11-4-17
Csa   privacy by design & gdpr austin chambers 11-4-17Csa   privacy by design & gdpr austin chambers 11-4-17
Csa privacy by design & gdpr austin chambers 11-4-17
Trish McGinity, CCSK
 
Privacy 101
Privacy 101Privacy 101
Cloud Seeding
Cloud SeedingCloud Seeding
Cloud Seeding
Trish McGinity, CCSK
 
Token Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure WebToken Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure Web
Trish McGinity, CCSK
 
Security and Automation: Can they work together? Can we survive if they don't?
Security and Automation: Can they work together?  Can we survive if they don't?Security and Automation: Can they work together?  Can we survive if they don't?
Security and Automation: Can they work together? Can we survive if they don't?
Trish McGinity, CCSK
 
GDPR Overview
GDPR OverviewGDPR Overview
GDPR Overview
Trish McGinity, CCSK
 
Practical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggPractical AWS Security - Scott Hogg
Practical AWS Security - Scott Hogg
Trish McGinity, CCSK
 
CSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageCSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassage
Trish McGinity, CCSK
 
Csa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghxCsa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghx
Trish McGinity, CCSK
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
Trish McGinity, CCSK
 
Andrew Useckas Csa presentation hacking custom webapps 4 3
Andrew Useckas Csa presentation   hacking custom webapps 4 3Andrew Useckas Csa presentation   hacking custom webapps 4 3
Andrew Useckas Csa presentation hacking custom webapps 4 3
Trish McGinity, CCSK
 
Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities
Trish McGinity, CCSK
 
Shawn Harris - CCSP SAH v2
Shawn Harris - CCSP SAH v2Shawn Harris - CCSP SAH v2
Shawn Harris - CCSP SAH v2
Trish McGinity, CCSK
 
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionLarry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Trish McGinity, CCSK
 
Ed Rios - New ncc brief
Ed Rios - New ncc briefEd Rios - New ncc brief
Ed Rios - New ncc brief
Trish McGinity, CCSK
 
Davitt Potter - CSA Arrow
Davitt Potter - CSA ArrowDavitt Potter - CSA Arrow
Davitt Potter - CSA Arrow
Trish McGinity, CCSK
 

More from Trish McGinity, CCSK (16)

Csa privacy by design & gdpr austin chambers 11-4-17
Csa   privacy by design & gdpr austin chambers 11-4-17Csa   privacy by design & gdpr austin chambers 11-4-17
Csa privacy by design & gdpr austin chambers 11-4-17
 
Privacy 101
Privacy 101Privacy 101
Privacy 101
 
Cloud Seeding
Cloud SeedingCloud Seeding
Cloud Seeding
 
Token Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure WebToken Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure Web
 
Security and Automation: Can they work together? Can we survive if they don't?
Security and Automation: Can they work together?  Can we survive if they don't?Security and Automation: Can they work together?  Can we survive if they don't?
Security and Automation: Can they work together? Can we survive if they don't?
 
GDPR Overview
GDPR OverviewGDPR Overview
GDPR Overview
 
Practical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggPractical AWS Security - Scott Hogg
Practical AWS Security - Scott Hogg
 
CSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageCSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassage
 
Csa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghxCsa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghx
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
 
Andrew Useckas Csa presentation hacking custom webapps 4 3
Andrew Useckas Csa presentation   hacking custom webapps 4 3Andrew Useckas Csa presentation   hacking custom webapps 4 3
Andrew Useckas Csa presentation hacking custom webapps 4 3
 
Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities
 
Shawn Harris - CCSP SAH v2
Shawn Harris - CCSP SAH v2Shawn Harris - CCSP SAH v2
Shawn Harris - CCSP SAH v2
 
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionLarry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
 
Ed Rios - New ncc brief
Ed Rios - New ncc briefEd Rios - New ncc brief
Ed Rios - New ncc brief
 
Davitt Potter - CSA Arrow
Davitt Potter - CSA ArrowDavitt Potter - CSA Arrow
Davitt Potter - CSA Arrow
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Scott Hogg - Gtri cloud security knowledge and certs

  • 1. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. Cloud Security Knowledge and Certifications Presented by Scott Hogg, CTO GTRI CCIE #5133, CISSP #4610, CCSP, CCSK, AWS CSA-Associate Colorado CSA Fall Summit – 11/10/2016
  • 2. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • Securing Cloud Services – Cloud Security Standards and Guidelines • Cloud Security Certifications – Cloud Security Alliance (CSA) Certificate of Cloud Security Knowledge (CCSK) – (ISC)2 Certified Cloud Security Professional (CCSP) Today’s Agenda
  • 3. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • Cloud Service Security Concerns/Threats • Cloud Service Provider Security Certifications Cloud Security Concepts
  • 4. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • A breach of the Cloud Service Provider’s infrastructure can lead to a “Hyperjacking” even whereby many customer’s data is exposed • Examples of CSP Data Breaches: – Google failure March 2011 deletion of 150k Gmail info – Code Spaces goes out of business in June 2014 after AWS hack – Google Drive breach in July 2014 hyperlink vulnerability – Apple iCloud exposure of celebrity photos, August 2014 – Dropbox security breach in October 2014, compromising 7M user passwords held for Bitcoin (BTC) ransom – Worcester Polytechnic Institute (WPI) claims cross-VM RSA key recovery in AWS, October 2015 – Datadog password breach for their AWS customers in July 2016 Concern About CSP Security
  • 5. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied.
  • 6. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • Cloud Security Alliance (CSA) provides advice for securing cloud computing environments • CSA is a US Federal 501(c)6 not-for-profit org, formed in late 2008, now has over 48,000 members • Mission = “promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing” • https://cloudsecurityalliance.org/ Cloud Security Alliance (CSA)
  • 7. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • CSA stated that the top three cloud computing threats are Insecure Interfaces and API's, Data Loss & Leakage, and Hardware Failure. • CSA’s Top 7 Security Threats (March 2010) – https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf • In February 2013, the CSA published their “The Notorious Nine” cloud computing top threats – https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notor ious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf CSA – The Notorious Nine 1. Data Breaches 2. Data Loss 3. Account or Service Traffic Hijacking 4. Insecure Interfaces and APIs 5. Denial of Service (DoS) 6. Malicious Insiders 7. Abuse of Cloud Services 8. Insufficient Due Diligence 9. Shared Technology Vulnerabilities
  • 8. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • CSA published their newest Top 12 cloud computing threats at 2016 RSA conference • Threat No. 1: Data breaches • Threat No. 2: Compromised credentials and broken authentication • Threat No. 3: Hacked interfaces and APIs • Threat No. 4: Exploited system vulnerabilities • Threat No. 5: Account hijacking • Threat No. 6: Malicious insiders CSA Treacherous 12 (or the Dirty Dozen)
  • 9. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • Threat No. 7: The APT parasite • Threat No. 8: Permanent data loss • Threat No. 9: Inadequate diligence • Threat No. 10: Cloud service abuses • Threat No. 11: DoS attacks • Threat No. 12: Shared technology, shared dangers CSA Treacherous 12 (or the Dirty Dozen)
  • 10. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • Customer bears more responsibility with IaaS than SaaS Cloud Security Responsibility – A Sliding Scale IaaS PaaS SaaS Security GRC Data Security App Security Platform Security Infrastructure Security Physical Security
  • 11. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • Cloud Service Providers (CSPs) can obtain certifications attesting their compliance with security standards. – SOC 1/SSAE 16/ISAE 3402, SOC2, SOC3 American Institute of Certified Public Accountants (AICPA) audit reports may be requested from the provider. – International Organization for Standardization (ISO) 27001 – Cloud Security Alliance (CSA) Security, Trust & Assurance Registry (STAR) – U.S. Health Insurance Portability and Accountability Act (HIPAA) – Payment Card Industry (PCI) Data Security Standard (DSS) Level 1 service provider – Motion Picture Association of America (MPAA) Cloud Compliance Assurance
  • 12. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • American Institute of Certified Public Accountants (AICPA) – Wants to make sure organizations are using reliable and secure services that their business relies upon – Compliance with Sarbanes Oxley's (SOX) requirement (section 404) • Statement on Auditing Standards No. 70 (SAS 70) • Statement on Standards for Attestation Engagements (SSAE) 16 – American standard that replaces SAS 70 – Similar to the International standard ISAE 3402 – Service Organization Controls (SOC) 1, 2, & 3 – http://ssae16.com/SSAE16_overview.html AICPA SSAE16 SOC 1/2/3
  • 13. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • Service availability is a critical component of any cloud service • CSPs operate within data centers that they may own and manage or collocate their systems • The Uptime Institute provides a “Tier Certification System” for assessing critical data center infrastructure to promote increased availability • Data Center Site Infrastructure Tier Standard: Topology – Tier I: Basic Site Infrastructure – Tier II: Redundant Site Infrastructure Capacity Components – Tier III: Concurrently Maintainable Site Infrastructure – Tier IV: Fault Tolerant Site Infrastructure • Check the tier rating of your current data center or cloud provider – https://uptimeinstitute.com/TierCertification/ – https://uptimeinstitute.com/TierCertification/certMaps.php The Uptime Institute Tier Standard: Topology
  • 14. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • ISO/IEC 27001:2013 – Information Security Management System (ISMS) • ISO/IEC 17788:2014 – Information technology -- Cloud computing -- Overview and vocabulary • ISO/IEC 17789:2014 – Information technology -- Cloud computing -- Reference architecture ISO/IEC Cloud Security Standards
  • 15. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • U.S. Federal organizations have specialized requirements for secure cloud services. • Civilian and DOD organizations may have to meet NIST 800- 37 and DoD Information Assurance Certification and Accreditation Process (DIACAP) and Federal Information Security Management Act (FISMA) compliance. • Cloud providers may also be required to meet US International Traffic in Arms Regulations (ITAR) compliance. • Federal customers also need to have FIPS 140-2 security systems running in the cloud. • Federal Risk and Authorization Management Program (FedRAMP) certified cloud providers are required. U.S. Federal Cloud Security Requirements
  • 16. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • The OMB requires federal agencies to use FedRAMP (Federal Risk and Authorization Management Program) accredited cloud services for FIPS 199 Low and Moderate system categories (Based on FISMA and NIST 800-53 Rev3 standards) – http://www.FedRAMP.gov • FedRAMP established the Joint Authorization Board (JAB) to approve cloud services and monitor the process • The JAB defines the standards by which Third Party Assessment Organizations (3PAOs) will assess the cloud providers • Third Party Accreditation Organizations (3PAOs) include: Coalfire, Kratos SecureInfo, Veris Group, among others – https://www.fedramp.gov/marketplace/accredited-3paos/ • FedRAMP Provisional Authority To Operate (ATO) issued by the JAB (after review of security assessment package) to the federal agency consuming the cloud services • List of FedRAMP Compliant Systems – https://www.fedramp.gov/marketplace/compliant-systems/ FedRAMP
  • 17. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • NIST Cloud Computing Public Security Working Group • NIST SP 500-292 – NIST Cloud Computing Reference Architecture • NIST SP 500-293 – US Government Cloud Computing Technology Roadmap Volume 1, 2 & 3 • NIST SP 500-299 – NIST Cloud Computing Security Reference Architecture • NIST SP 800-144 – Guidelines on Security and Privacy in Public Cloud Computing • NIST SP 800-145 – The NIST Definition of Cloud Computing • NIST SP 800-146 – Cloud Computing Synopsis and Recommendations NIST Guidelines on Cloud Security
  • 18. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied.
  • 19. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • CSA’s CCM is a gigantic spreadsheet that lists over 130 prominent control specifications across 15 control domains and relates each to pertinent cloud security standards and best practices • Mappings for FedRAMP Low/Moderate, ISO/IEC 27001, NIST 800-53, among others • This is a valuable resource to help remind you of all the controls to consider when operating in a cloud environment • Cloud Controls Matrix (CCM) v3.0.1 (6-6-16 Update) – https://cloudsecurityalliance.org/group/cloud-controls-matrix/ – https://cloudsecurityalliance.org/download/cloud-controls-matrix- v3-0-1/ CSA Cloud Controls Matrix (CCM)
  • 20. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. CSA Cloud Controls Matrix (CCM)
  • 21. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • Customers want to evaluate their CSPs against their requirements and select the best provider • Consider the CSPs position when they receive numerous individual separate security questionnaires and assessments from customers • The CAIQ provides a standard template that answers most customer queries for information – 300-line spreadsheet that can help streamline CSP evaluation – https://cloudsecurityalliance.org/download/consensus- assessments-initiative-questionnaire-v3-0-1/ Consensus Assessments Initiative Questionnaire
  • 22. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. Consensus Assessments Initiative Questionnaire
  • 23. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • The CSA created the STAR certification for CSPs • The STAR certification rates the CSP based on their adherence and adoption to cloud security best practices and controls • CSA STAR is based on the CSA’s Cloud Controls Matrix (CCM) and the Consensus Assessments Initiative Questionnaire (CAIQ) • CSA STAR program provides a complimentary registry for CSPs – https://cloudsecurityalliance.org/star/#_registry • There are 3 levels of assurance CSA Security Trust & Assurance Registry (STAR)
  • 24. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • https://cloudsecurityalliance.org/star/ CSA Security Trust & Assurance Registry (STAR)
  • 25. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied.
  • 26. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • CSA CCSK • (ISC)2 CCSP Cloud Security Certifications
  • 27. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • The CSA created a certification for individuals • The CCSK validates that an individual has the understanding and skills to help protect an organization who is consuming cloud services • The CCSK shows you the best practices and things to consider when protecting cloud-based assets • The CCSK domains provide a holistic cloud security controls framework – https://cloudsecurityalliance.org/education/ccsk/ Certificate of Cloud Security Knowledge
  • 28. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • CCSK Guidance V3 has 14 domains CCSK Body of Knowledge Domains 1. Cloud Architecture 2. Governance and Enterprise Risk 3. Legal and Electronic Discovery 4. Compliance and Audit 5. Information Lifecycle Management 6. Portability and Interoperability 7. Traditional Security, BCM, D/R 8. Data Center Operations 9. Incident Response 10. Application Security 11. Encryption and Key Management 12. Identity and Access Management 13. Virtualization 14. Security-as-a-Service
  • 29. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • CCSK Training Classes are available (HP Education Services) – CCSK Foundation (2 days), CCSK Plus (3 days) • CSA guidance version 3.0, Security Guidance for Critical Areas of Focus in Cloud Computing, V3 (92% of test) • European Network and Information Security Agency (ENISA) whitepaper (8% of test) – Cloud Computing: Benefits, Risks and Recommendations for Information Security • NIST documents (800-144, 800-145, 800-146, 500-292) Preparing for the CCSK
  • 30. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • Read the v3 FAQ and the v3 Prep guide – https://downloads.cloudsecurityalliance.org/ccsk/CCS K_FAQ_v3.pdf – https://cloudsecurityalliance.org/wp- content/uploads/2013/02/CCSK-Prep-Guide-V3.pdf • CCSK online open-book exam costs $345 – 60 questions, 90 minutes, >80% to pass, 2 attempts • https://ccsk.cloudsecurityalliance.org/ Taking the CCSK Exam
  • 31. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • CCSK can be used for CPEs for other certs • CSA drafted CSA Guidance version 4.0 (GitHub) – https://github.com/cloudsecurityalliance/CSA- Guidance • CCSK version 4 (coming soon) • CCSK Developer certification (in the works) • CCSK Assurance certification (in the works) What’s Next for the CCSK?
  • 32. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • CSA and ISC2 collaborated on developing a new cloud certification that builds upon the CCSK Certified Cloud Security Professional (CCSP) – (ISC)2
  • 33. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • The CCSP Common Body of Knowledge (CBK) consists of the following six domains: – 1 Architectural Concepts & Design Requirements – 2 Cloud Data Security – 3 Cloud Platform & Infrastructure Security – 4 Cloud Application Security – 5 Operations – 6 Legal & Compliance • ISO/IEC 17788 and NIST 800-145, 800-146, 500-299 • https://www.isc2.org/ccsp/default.aspx Certified Cloud Security Professional (CCSP) – (ISC)2
  • 34. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • Live In-Person CBK Training Class, 5 days, $1995 • Live On-Line CBK Training Class, 5 days, $1395 • On-Demand On-Line CBK Training - $495 ($395 for CISSPs) • The Official (ISC)2 Guide to the CCSP CBK, by Adam Gordon – ISBN: 978-1-119-20749-8, 560 pages, November 2015 – http://www.wiley.com/WileyCDA/WileyTitle/productCd- 1119207495.html – $80, Members get 50% off with code ISC50 • Free Flash Cards On-Line • Pearson VUE Computer-Based Exam – 4 hours, 125 questions (>700/1000) - $549 Certified Cloud Security Professional (CCSP) – (ISC)2
  • 35. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. Cloud Security Summary
  • 36. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • Security has more to do with people and processes than technology. Good security comes down to discipline. • If you have good InfoSec hygiene in your on-premises IT infrastructure, you can have good cloud security operations. • Cloud services can be less secure, equally secure, or more secure than your traditional on-premises data center. • It is easier to be secure from the beginning rather than try to add security in after systems are in production. • Good design, implementation using best practices, proper maintenance, and vigilance will make your cloud system secure. • We encourage you to achieve cloud security certification to validate your understanding of the topic area. Cloud Security – The Bottom Line
  • 37. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. Thank You For Your Time! Scott Hogg, CTO GTRI 303-949-4865 | SHogg@gtri.com | @ScottHogg

Editor's Notes

  1. AWS Certified Solutions Architect - Associate Many organizations are moving to the cloud and they need to do so with their eyes wide open. Some organizations and IT administrators may fear the cloud, but we all use cloud services in some way. Our organizations want to take advantage of the financial and operational benefits of cloud computing, but prevent exposing our organizations to undue risk. This presentation covers the topic of cloud security in a down-to-earth and practical way and covers how you can become knowledgeable about cloud security and obtain certification. This presentation will review the current industry standard guidelines for cloud security Discuss risks of cloud services used insecurely Review the important security controls when operating in a cloud environment We will also review a few of the popular cloud security certifications, namely: Cloud Security Alliance (CSA) Certificate of Cloud Security Knowledge (CCSK) (ISC)2 Certified Cloud Security Professional (CCSP)
  2. Breaking Down Cloud Security Proactively build security into your cloud architecture or reactively assess the security of your cloud   Presentation Abstract: Many organizations are moving to the cloud and they need to do so with their eyes wide open. Some organizations and IT administrators may fear the cloud, but we all use cloud services in some way. Our organizations want to take advantage of the financial and operational benefits of cloud computing, but not expose our organizations to undue risk. This presentation covers the topic of cloud security in a down-to-earth and practical way and provides realistic security measures you can put in practice right away. This presentation will review the current industry standard guidelines for cloud security We will also review several popular Cloud Service Provider (CSP) security models and security controls. No cloud security presentation would be complete without a brief introduction to software container security concepts. This presentation will review several examples of cloud security controls that provide virtual firewalling, server/service security, encryption. We will also review a few of the popular cloud security certifications, namely: Cloud Security Alliance (CSA) Certificate of Cloud Security Knowledge (CCSK) (ISC)2 Certified Cloud Security Professional (CCSP)   Learner Objectives: After this session, the attendee will understand the common models for cloud security and the typical security domains and protection measures. The attendee will understand common security controls in public cloud providers and point-solutions to help secure access, data, and services. The attendee will be inspired to pursue one of the popular cloud security certifications to further build their cloud security capabilities.   Tech Bio: Scott Hogg, CCIE #5133, CISSP #4610, is the CTO for Global Technology Resources, Inc. (GTRI). Scott helps organizations leverage cloud services securely and possess the CCSK and CCSP cloud security certifications. Scott also actively works on SDN security and network programmability and has formed the Denver Network Programmability User Group (NPUG) chapter. Scott is a founding member of the Rocky Mountain IPv6 Task Force (RMv6TF), and a member of the Infoblox IPv6 Center of Excellence (COE). Scott has authored the Cisco Press book on IPv6 Security and writes for NetworkWorld.com.  
  3. CSP Security Breaches Google Drive, Dropbox, Box and iCloud Reach the Top 5 Cloud Storage Security Breaches List https://psg.hitachi-solutions.com/credeon/blog/google-drive-dropbox-box-and-icloud-reach-the-top-5-cloud-storage-security-breaches-list Dropbox http://www.cnet.com/news/hackers-hold-7-million-dropbox-passwords-ransom/ http://www.networkworld.com/article/3114724/the-dropbox-data-breach-is-a-warning-to-update-passwords.html iCloud http://www.buzzfeed.com/rachelzarrell/jennifer-lawrence-ariana-grande-picture-leak#.am7DvxzM0 http://www.bankinfosecurity.com/crypto-keys-stolen-from-amazon-cloud-a-8581/op-1 Code Spaces offered developers source code repositories and project management services using Git or Subversion http://www.infoworld.com/article/2608076/data-center/murder-in-the-amazon-cloud.html http://www.information-age.com/technology/cloud-and-virtualisation/123458406/catastrophe-cloud-what-aws-hacks-mean-cloud-providers Researchers steal secret RSA encryption keys in Amazon’s cloud http://www.networkworld.com/article/2989757/cloud-security/researchers-steal-secret-rsa-encryption-keys-in-amazon-s-cloud.html https://eprint.iacr.org/2015/898.pdf Mexican voter info on AWS https://www.databreaches.net/personal-info-of-93-4-million-mexicans-exposed-on-amazon/ Datadog breach http://www.geekwire.com/2016/datadog-amazon-web-services-customers-hit-security-breach/ +++ Rhino Security Labs https://rhinosecuritylabs.com/2016/02/aws-security-vulnerabilities-and-the-attackers-perspective/ 9 data security tips for cloud migration http://www.computerworld.com/article/3106908/cloud-security/9-data-security-tips-for-cloud-migration.html Anthem 2015 breach – cloud service was used for exfiltration of data Mid 2015 IRS breach – vulnerable APIs – exposing 300,000 records
  4. https://en.wikipedia.org/wiki/Cloud_Security_Alliance https://cloudsecurityalliance.org/ Cloud Security Alliance (CSA) is a non-profit group that aims to educate and promote the use of best practices for providing security assurance within Cloud Computing. They freely publish their Security Guidance for Critical Areas of Focus in Cloud Computing v3.0. Cloud Security Alliance’s Trusted Cloud Initiative (TCI) – Reference Architecture https://research.cloudsecurityalliance.org/tci/ https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf Got big data? The Cloud Security Alliance offers up 100 best practices http://www.computerworld.com/article/3113127/security/got-big-data-the-cloud-security-alliance-offers-up-100-best-practices.html
  5. https://cloudsecurityalliance.org/ Abuse and Nefarious Use of Cloud Computing Insecure Interfaces and APIs (Application Programming Interfaces) Malicious Insiders Shared Technology Issues Data Loss or Leakage Account or Service Hijacking Unknown Risk Profile https://en.wikipedia.org/wiki/Cloud_computing#Security_and_privacy https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf International Journal of Advanced Research in Engineering and Applied Sciences SECURITY ANALYSIS OF CLOUD COMPUTING, By Anju Chhibber*, Dr. Sunil Batra** http://garph.co.uk/IJAREAS/Mar2013/6.pdf -- only lists 6 of the 7??? Gartner: Seven cloud-computing security risks http://www.infoworld.com/article/2652198/security/gartner--seven-cloud-computing-security-risks.html June 2008 report titled "Assessing the Security Risks of Cloud Computing." Privileged user access Regulatory compliance Data location Data segregation Recovery Investigative support Long-term viability https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
  6. The top 12 cloud security threats http://www.networkworld.com/article/3042610/security/the-dirty-dozen-12-cloud-security-threats.html https://cloudsecurityalliance.org/group/top-threats/
  7. The top 12 cloud security threats http://www.networkworld.com/article/3042610/security/the-dirty-dozen-12-cloud-security-threats.html
  8. Page 242 – CCSP class guide
  9. Is your organization mandated to meet specific compliance requirements? Look on their web site first
  10. https://en.wikipedia.org/wiki/SAS70 Replaced by https://en.wikipedia.org/wiki/SSAE_16 http://ssae16.com/SSAE16_overview.html http://www.datacenterknowledge.com/archives/2011/09/27/why-data-centers-need-ssae-16/ http://www.aicpa.org/research/standards/auditattest/downloadabledocuments/at-00801.pdf http://www.ifac.org/system/files/downloads/b014-2010-iaasb-handbook-isae-3402.pdf
  11. https://uptimeinstitute.com/ https://uptimeinstitute.com/tiers https://uptimeinstitute.com/TierCertification/allCertifications.php?page=1&ipp=All https://uptimeinstitute.com/TierCertification/certMaps.php
  12. ISO/IEC 15408-1:2009 – Common Criteria (CC) http://www.iso.org/iso/catalogue_detail.htm?csnumber=50341 ISO/IEC 17788:2014 – Cloud Overview and vocabulary Information technology -- Cloud computing -- Overview and vocabulary http://www.iso.org/iso/catalogue_detail?csnumber=60544 ISO/IEC 17789:2014 – Cloud Reference Architecture Information technology -- Cloud computing -- Reference architecture http://www.iso.org/iso/catalogue_detail?csnumber=60545 ISO/IEC 27000:2014 Information technology – Security techniques – Information security management systems – Overview and vocabulary. ISO/IEC 27001:2013 – ISMS - Information security management systems Requirements Information technology — Security techniques — Information security management systems — Requirements http://www.iso.org/iso/home/standards/management-standards/iso27001.htm https://www.iso.org/obp/ui/#iso:std:iso-iec:27001:ed-2:v1:en ISO/IEC 27018:2014 – PII Data Information technology -- Security techniques -- Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors http://www.iso.org/iso/catalogue_detail.htm?csnumber=61498 PII data in cloud ISO/IEC 27034-1:2011 – Application Security – Overview and concepts Information technology -- Security techniques -- Application security -- Part 1: Overview and concepts http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=44378 ISO/IEC 27037:2012 – Guidelines for identification, collection, acquisition and preservation of digital evidence Information technology -- Security techniques -- Guidelines for identification, collection, acquisition and preservation of digital evidence http://www.iso.org/iso/catalogue_detail?csnumber=44381 ISO/IEC 27041:2015 - Guidance on assuring suitability and adequacy of incident investigative method Information technology -- Security techniques -- Guidance on assuring suitability and adequacy of incident investigative method http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=44405 ISO/IEC 27042:2015 - Guidelines for the analysis and interpretation of digital evidence Information technology -- Security techniques -- Guidelines for the analysis and interpretation of digital evidence http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=44406 ISO/IEC 27043:2015 - Incident investigation principles and processes Information technology -- Security techniques -- Incident investigation principles and processes http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=44407 ISO/IEC DIS 27050-1 - Electronic discovery -- Part 1: Overview and concepts Information technology -- Security techniques -- Electronic discovery -- Part 1: Overview and concepts http://www.iso.org/iso/catalogue_detail.htm?csnumber=63081
  13. http://collaborate.nist.gov/twiki-cloud-computing/pub/CloudComputing/CloudSecurity/NIST_Security_Reference_Architecture_2013.05.15_v1.0.pdf https://www.fedramp.gov/ AWS, Microsoft cloud win US government security approval http://www.networkworld.com/article/3088124/aws-microsoft-cloud-win-us-government-security-approval.html AWS GovCloud, Microsoft's Azure GovCloud, and CSRA's ARC-P IaaS have received provisional authority to offer services under the high baseline of the government's Federal Risk and Authorization Management Program (FedRAMP), a set of security standards for cloud services. AWS and Azure clouds gain security OK from feds http://www.computerworld.com/article/3088130/security/aws-and-azure-clouds-gain-security-ok-from-feds.html FedRAMP: A challenging path to operational excellence for cloud providers http://www.networkworld.com/article/3082212/compliance/fedramp-a-challenging-path-to-operational-excellence-for-cloud-providers.html
  14. https://en.wikipedia.org/wiki/FedRAMP http://www.FedRAMP.gov http://cloud.cio.gov/fedramp FedRAMP is a collaboration of the GSA, NIST, DHS, DOD, NSA, OMB, the Federal CIO Council https://www.fedramp.gov/marketplace/compliant-systems/ http://www.gsa.gov/portal/category/102375 FedRAMP Provisional ATO issued by the Joint Authorization Board (JAB) Third-party, independent Assessor (3PAO) https://www.fedramp.gov/participate/3paos/ https://www.coalfire.com/ AWS Compliance http://aws.amazon.com/compliance/ http://aws.amazon.com/compliance/fedramp-faqs/
  15. Federal Cloud Computing Strategy published in 2011, U.S. Chief Information Officer (CIO) Vivek Kundra http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf http://collaborate.nist.gov/twiki-cloud-computing/pub/CloudComputing/CloudSecurity/NIST_Security_Reference_Architecture_2013.05.15_v1.0.pdf NIST SP 500-291: Cloud Computing Standards Roadmap NIST SP 500-292: NIST Cloud Computing Reference Architecture NIST SP 500-293: US Government Cloud Computing Technology Roadmap Volume 1, High-Priority requirements to Further USG Agency Cloud Computing Adoption NIST SP 500-293: US Government Cloud Computing Technology Roadmap Volume II, Useful Information for Cloud Adopters (Draft) NIST SP 500-293: US Government Cloud Computing Technology Roadmap Volume III, Technical Considerations for USG Cloud Computing Deployment Decisions (Draft) NIST SP 800-144: Guidelines on Security and Privacy in Public Cloud Computing, NIST SP 800-145: The NIST Definition of Cloud Computing NIST SP 800-146: Cloud Computing Synopsis and Recommendations (Draft) Cloud-adapted Risk Management Framework (CRMF)
  16. CSA Cloud Controls Matrix https://cloudsecurityalliance.org/group/cloud-controls-matrix/ Latest version: 3.0.1 07/10/2014 https://cloudsecurityalliance.org/research/ccm/
  17. CSA Cloud Controls Matrix https://cloudsecurityalliance.org/group/cloud-controls-matrix/ Cloud Controls Matrix v3.0.1 (6-6-16 Update) https://cloudsecurityalliance.org/download/cloud-controls-matrix-v3-0-1/
  18. Consensus Assessments Initiative Questionnaire v3.0.1 Now color coded to match the CCM https://cloudsecurityalliance.org/media/news/consensus-assessments-initiative-questionnaire-caiq-v-3-review/
  19. Consensus Assessments Initiative Questionnaire v3.0.1 Now color coded to match the CCM https://cloudsecurityalliance.org/media/news/consensus-assessments-initiative-questionnaire-caiq-v-3-review/
  20. https://cloudsecurityalliance.org/star/ LEVEL ONE: CSA STAR Self-Assessment LEVEL TWO: CSA STAR Attestation LEVEL TWO: CSA STAR Certification LEVEL TWO: CSA C-STAR Assessment LEVEL THREE: CSA STAR Continuous Monitoring STARWatch SaaS Software that helps automate the assessment/compliance process https://cloudsecurityalliance.org/star/#_watch CSA STARWatch is a Software as a Service (SaaS) application to help organizations manage compliance with CSA STAR (Security, Trust and Assurance Registry) requirements. STARWatch delivers the content of the Cloud Controls Matrix (CCM) and Consensus Assessments Initiative Questionnaire (CAIQ) in a database format, enabling users to manage compliance of cloud services with the CSA best practices
  21. https://cloudsecurityalliance.org/education/ccsk/#_why https://cloudsecurityalliance.org/wp-content/uploads/2015/04/CSA_CCSK-Brochure_April_2015.pdf
  22. CSA Security Guidance for Critical Areas of Focus in Cloud Computing V3 https://cloudsecurityalliance.org/education/ccsk/ https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf CSA has a vendor independent certification that focuses on the subject of cloud security. GTRI has several people who have achieved this cert. GTRI can rely on these individuals when we talk to our customers about how to secure a cloud deployment.
  23. Preparing to take the CCSK exam – Study materials https://cloudsecurityalliance.org/education/training/ https://ccsk.cloudsecurityalliance.org/ https://cloudsecurityalliance.org/education/ccsk/ https://cloudsecurityalliance.org/education/training/ https://cloudsecurityalliance.org/wp-content/uploads/2013/02/CCSK-V3-FAQ.pdf https://cloudsecurityalliance.org/wp-content/uploads/2013/02/CCSK-Prep-Guide-V3.pdf Udemy https://www.udemy.com/understand-the-ccsk-cloud-security-certification/
  24. https://ccsk.cloudsecurityalliance.org/ https://cloudsecurityalliance.org/education/ccsk/ https://cloudsecurityalliance.org/education/training/ https://downloads.cloudsecurityalliance.org/ccsk/CCSK_FAQ_v3.pdf https://cloudsecurityalliance.org/wp-content/uploads/2013/02/CCSK-V3-FAQ.pdf https://cloudsecurityalliance.org/wp-content/uploads/2013/02/CCSK-Prep-Guide-V3.pdf Udemy https://www.udemy.com/understand-the-ccsk-cloud-security-certification/
  25. CCSK v4 was planned for early 2016 https://cloudsecurityalliance.org/education/ccsk/#_about
  26. https://www.isc2.org/ccsp-for-ccsks/default.aspx CCSK counts for 1 year of experience requirement for the CCSP CCSKs get discount on instructor-led classroom or live-on-line training CCSKs get special pricing for self-study tools for CCSK and OnDemand Training ($395)
  27. https://www.isc2.org/ccsp/default.aspx https://www.isc2.org/ccsp-domains/default.aspx https://www.isc2.org/ccsp-faqs/default.aspx
  28. https://www.isc2.org/ccsp/default.aspx Head in The Clouds & Feet on The Ground: The CCSP Certification https://itspmagazine.com/from-the-newsroom/head-in-the-clouds-feet-on-the-ground-the-ccsp-certification
  29. Converge Your Teams for Greater SDN/NFV Benefits https://communities.cisco.com/people/shogg@gtri.com/blog/2016/06/14/converge-your-teams-for-greater-sdnnfv-benefits