SlideShare a Scribd company logo
“Head
in
the
clouds,
feet
on
the

          ground
‐
the
business
side
of

             security
in
the
cloud”


                                        Subra
Kumaraswamy

                                         subra.k@gmail.com

                                          Twi=er
‐
@Subrak




Dec
07,
2009
   www.securityforum.org    Cloud ISF 20th Annual World Subra Kumaraswamy
                                               Security and privacy – Congress 2009                                                        1

                                                                                         Copyright © 2009 Information Security Forum Limited 1
Cloud Computing: Evolution




 www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                               Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited   2
                                                                                                                                   2
5 Essential Cloud Characteristics
•  On-demand self-service
•  Broad network access
•  Resource pooling
  -  Location independence
•  Rapid elasticity
•  Measured service


      www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                    Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited   3

                                                                                                                                    3
3 Cloud Service Models
•  Cloud Software as a Service (SaaS)
  -  Use provider’s applications over a network
•  Cloud Platform as a Service (PaaS)
  -  Deploy customer-created applications to a cloud
•  Cloud Infrastructure as a Service (IaaS)
  -  Rent processing, storage, network capacity, and other
     fundamental computing resources
•  To be considered “cloud” they must be deployed on top
  of cloud infrastructure that has the key characteristics

          www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                        Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited   4

                                                                                                                                        4
Cloud Pyramid of Flexibility




  www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited   5
                                                                                                                                    5
4 Cloud Deployment Models
•  Private cloud
  -  enterprise owned or leased
•  Community cloud
  -  shared infrastructure for specific community
•  Public cloud
  -  Sold to the public, mega-scale infrastructure
•  Hybrid cloud
  -  composition of two or more clouds

         www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                       Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited   6

                                                                                                                                       6
The Cloud: How are people using it?




                                                      7
      www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                    Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited   7
Changing IT Relationships




     www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                   Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited   8
What Not a Cloud?




                                                    9
    www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                  Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited   9
Focusing the Security Discussion
                                                                                                                    IaaS, Hybrid,
                                                            Application Domains
                                                                                                                       HPC/
 SaaS,                                                                                                                Analytics
 Public,
  CRM




                                                                                                         Private
                                   Software as a Service




                                                                                                Hybrid
                                                                                      Public
                XaaS Layers




                                   Platform as a Service


                              Infrastructure as a Service
                                                                                                                     IaaS, Public,
                                                                                                                     Transcoding

           www.securityforum.org      Cloud ISF 20th Annual World Subra Kumaraswamy
                                            Security and privacy – Congress 2009               Copyright © 2009 Information Security Forum Limited   10
Components of Information Security



                Encryption, Data masking, Content protection



                                         Application-level
                                                Host-level
                                            Network-level


     www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                   Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited   11
Analyzing Cloud Security
•  Some key issues:
  -  Trust, multi-tenancy, encryption, key management
     compliance
•  Clouds are massively complex systems can be
  reduced to simple primitives that are replicated
  thousands of times and common functional units
•  Cloud security is a tractable problem
  -  There are both advantages and challenges


        www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                      Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited   12
Balancing Threat Exposure and Cost
Effectiveness
•  Private clouds may have less threat exposure than
  community or hosted clouds which have less threat
  exposure than public clouds.
•  Massive public clouds may be more cost effective
  than large community clouds which may be more cost
  effective than small private clouds.




        www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                      Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited   13
General Security Advantages
•  Democratization of security capabilities
•  Shifting public data to a external cloud reduces
  the exposure of the internal sensitive data
•  Forcing functions to add security controls
•  Clouds enable automated security management
•  Redundancy / Disaster Recovery



       www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                     Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited   14
General Security Challenges
•  Trusting vendor’s security model
•  Customer inability to respond to audit findings
•  Obtaining support for investigations
•  Indirect administrator accountability
•  Proprietary implementations can’t be examined
•  Loss of physical control


        www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                      Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited   15
Infrastructure Security
Trust boundaries have moved
  •  Specifically, customers are unsure where those trust
     boundaries have moved to
  •  Established model of network tiers or zones no
     longer exists
- Domain model does not fully replicate previous
model
  •  No viable (scalable) model for host-to-host trust
  •  Data labeling/tagging required at application-level
- Data separation is logical, not physical
        www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                      Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited
                                                                                                                                      16
                                                                                                                                      16
Data Security
•  Provider’s data collection efforts and monitoring
   of such (e.g., IPS, NBA)
•  Use of encryption
    —  Point-to-multipoint data-in-transit an issue

    —  Data-at-rest possibly not encrypted
    —  Data being processed definitely not encrypted

    —  Key management is a significant issue

    —  Advocated alternative methods (e.g., obfuscation,
       redaction, truncation) are not adequate
•  Data lineage, provenance
•  Data remanence
         www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                       Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited
                                                                                                                                       17
                                                                                                                                       17
Identity and Access Management (IAM)
Generally speaking, poor situation today:
  •  Provisioning of user access is proprietary to
    provider
  •  Strong authentication available only through
     delegation
  •  Federated identity widely not available
  •  User profiles are limited to “administrator” and
     “user”
  •  Privilege management is coarse, not granular
        www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                      Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited
                                                                                                                                      18
                                                                                                                                      18
Privacy Considerations
Transborder data issues may be exacerbated
  •  Specifically, where are cloud computing activities
    occurring?


Data governance is weak
  •  Encryption is not pervasive
  •  Data remanence receives inadequate attention
  •  CSPs absolve themselves of privacy concerns:
    “We don’t look at your data”

        www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                      Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited
                                                                                                                                      19
                                                                                                                                      19
Audit & Compliance Considerations
•  Effectiveness of current audit frameworks
   questionable (e.g., SAS 70 Type II)

•  CSP users need to define:
  - their control requirements
  - understand their CSP’s internal control
     monitoring processes
  -  analyze relevant external audit reports

•  Issue is assurance of compliance
       www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                     Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited
                                                                                                                                     20
                                                                                                                                     20
Impact on Role of Corporate IT
•  Governance issue as internal IT becomes
   “consultants” and business analysts to business
   units
•  Delineation of responsibilities between
   providers and customers much more nebulous
   than between customers and outsourcers,
   collocation facilities, or ASPs
•  Cloud computing likely to involve much more
   direct business unit interaction with CSPs than
   with other providers previously
       www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                     Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited
                                                                                                                                     21
                                                                                                                                     21
Getting Ready – IT Security
•  Governance framework that can be aligned with partners
•  Federation of Identity, strong authentication, privileged
  access and key management
•  Classification of data and privacy policy for data in cloud
•  Security Automation – Image standardization, user/
  network policy template
•  Understand the cloud service provider security
  architecture, SLA, policies, security feature and interfaces
•  Understand the ephemeral nature of compute and storage
  cloud and plan for archival of security logs
           www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                         Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited   22
Conclusions
•  Part of customers’ infrastructure security
   moves beyond their control
•  Provider’s infrastructure security may
   (enterprise) or may not (SMB) be less robust
   than customers’ expectations
•  Data security becomes significantly more
   important – yet provider capabilities are
   inadequate (except for simple storage which can
   be encrypted, and processing of non-sensitive
   (unregulated and unclassified) data
        www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                      Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited
                                                                                                                                      23
                                                                                                                                      23
Conclusions (continued)
•  IAM is less than adequate for enterprises – weak
  management of weak credentials unless
  (authentication) delegated back to customers

•  Because of above, expect significant business unit
  pressure to desensitize or anonymize data;
  expect this to become a chokepoint
   -  No established standards for obfuscation,
      redaction, or truncation


        www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                      Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited
                                                                                                                                      24
                                                                                                                                      24
Conclusions (continued)
•  Relationship between business units and
 corporate IT departments vis-à-vis CSPs will shift
 greater power to business units from IT

•  Number of functions performed today by
 corporate IT departments will shift to CSPs,
 along with corresponding job positions



       www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                     Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited
                                                                                                                                     25
                                                                                                                                     25
What’s Good about the Cloud?
•  A lot! Both for enterprises and SMBs – for
  handling of non-sensitive (unregulated and
  unclassified) data

•  Cost

•  Flexibility
•  Scalability

•  Speed
           www.securityforum.org   Cloud ISF 20th Annual World Subra Kumaraswamy
                                         Security and privacy – Congress 2009      Copyright © 2009 Information Security Forum Limited
                                                                                                                                         26
                                                                                                                                         26
Thank
you

                                           subra.k@gmail.com

                                             Twi=er
‐
@subrak






                                                            Disclaimer


 The
views
and
opinions
expressed
during
this
conference
are
those
of
the
speakers
and
do
not
necessarily
reflect
the
views
and

opinions
held
by
Sun
Microsystems.

Nothing
in
this
conference
should
be
construed
as
professional
or
legal
advice
or
as
creaGng
a

professional‐customer
or
a=orney‐client
relaGonship.

If
professional,
legal,
or
other
expert
assistance
is
required,
the
services
of
a

                                           competent
professional
should
be
sought.





Dec
7th,
2009
    www.securityforum.org     Cloud ISF 20th Annual World Subra Kumaraswamy
                                                  Security and privacy – Congress 2009                                                        27

                                                                                            Copyright © 2009 Information Security Forum Limited 27

More Related Content

What's hot

Hints and Tips for Monitoring Cisco UCS
Hints and Tips for Monitoring Cisco UCSHints and Tips for Monitoring Cisco UCS
Hints and Tips for Monitoring Cisco UCS
CA Nimsoft
 
IBM SmartCloudEnterprise use of IBM Rational Solutions
IBM SmartCloudEnterprise use of IBM Rational SolutionsIBM SmartCloudEnterprise use of IBM Rational Solutions
IBM SmartCloudEnterprise use of IBM Rational Solutions
Alex Amies
 
Neupart Isaca April 2012
Neupart Isaca April 2012Neupart Isaca April 2012
Neupart Isaca April 2012
Lars Neupart
 
State Of The Cloud - Lightning Talk
State Of The Cloud - Lightning TalkState Of The Cloud - Lightning Talk
State Of The Cloud - Lightning Talk
Randy Bias
 
MISA Cloud workshop - Cloud 101
MISA Cloud workshop - Cloud 101MISA Cloud workshop - Cloud 101
MISA Cloud workshop - Cloud 101
MISA Ontario Cloud SIG
 
Windows Azure Platfrom App Fabric
Windows Azure Platfrom App FabricWindows Azure Platfrom App Fabric
Windows Azure Platfrom App Fabric
Wes Yanaga
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
JD Sherry
 
VMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised securityVMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised security
Arrow ECS UK
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloud
nooralmousa
 
T1 05 emc forum track introductions manoj chugh final
T1 05 emc forum track introductions manoj chugh finalT1 05 emc forum track introductions manoj chugh final
T1 05 emc forum track introductions manoj chugh final
EMC Forum India
 
Presentation cloud, the whole offer
Presentation   cloud, the whole offerPresentation   cloud, the whole offer
Presentation cloud, the whole offer
xKinAnx
 
Keeping IT Real Webinar
Keeping IT Real WebinarKeeping IT Real Webinar
Keeping IT Real Webinar
johnworthington
 
Green IT/Cloud Computing
Green IT/Cloud ComputingGreen IT/Cloud Computing
Green IT/Cloud Computing
Center for Sustainable Energy
 
SIOS Private Cloud
SIOS Private CloudSIOS Private Cloud
SIOS Private Cloud
Jim Kaskade
 
Ibm Smart Business Overview Jimmy Mills
Ibm Smart Business Overview   Jimmy MillsIbm Smart Business Overview   Jimmy Mills
Ibm Smart Business Overview Jimmy Mills
Jimmy Mills
 
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
AIP Foundation
 
Cloud circle Simon Withers
Cloud circle Simon WithersCloud circle Simon Withers
Cloud circle Simon Withers
SunGard Availability Services UK
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - Chandna
Asheem Chandna
 
Zsl cloud-management-made-easier-with-scm
Zsl cloud-management-made-easier-with-scmZsl cloud-management-made-easier-with-scm
Zsl cloud-management-made-easier-with-scm
zslmarketing
 

What's hot (19)

Hints and Tips for Monitoring Cisco UCS
Hints and Tips for Monitoring Cisco UCSHints and Tips for Monitoring Cisco UCS
Hints and Tips for Monitoring Cisco UCS
 
IBM SmartCloudEnterprise use of IBM Rational Solutions
IBM SmartCloudEnterprise use of IBM Rational SolutionsIBM SmartCloudEnterprise use of IBM Rational Solutions
IBM SmartCloudEnterprise use of IBM Rational Solutions
 
Neupart Isaca April 2012
Neupart Isaca April 2012Neupart Isaca April 2012
Neupart Isaca April 2012
 
State Of The Cloud - Lightning Talk
State Of The Cloud - Lightning TalkState Of The Cloud - Lightning Talk
State Of The Cloud - Lightning Talk
 
MISA Cloud workshop - Cloud 101
MISA Cloud workshop - Cloud 101MISA Cloud workshop - Cloud 101
MISA Cloud workshop - Cloud 101
 
Windows Azure Platfrom App Fabric
Windows Azure Platfrom App FabricWindows Azure Platfrom App Fabric
Windows Azure Platfrom App Fabric
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
 
VMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised securityVMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised security
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloud
 
T1 05 emc forum track introductions manoj chugh final
T1 05 emc forum track introductions manoj chugh finalT1 05 emc forum track introductions manoj chugh final
T1 05 emc forum track introductions manoj chugh final
 
Presentation cloud, the whole offer
Presentation   cloud, the whole offerPresentation   cloud, the whole offer
Presentation cloud, the whole offer
 
Keeping IT Real Webinar
Keeping IT Real WebinarKeeping IT Real Webinar
Keeping IT Real Webinar
 
Green IT/Cloud Computing
Green IT/Cloud ComputingGreen IT/Cloud Computing
Green IT/Cloud Computing
 
SIOS Private Cloud
SIOS Private CloudSIOS Private Cloud
SIOS Private Cloud
 
Ibm Smart Business Overview Jimmy Mills
Ibm Smart Business Overview   Jimmy MillsIbm Smart Business Overview   Jimmy Mills
Ibm Smart Business Overview Jimmy Mills
 
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
 
Cloud circle Simon Withers
Cloud circle Simon WithersCloud circle Simon Withers
Cloud circle Simon Withers
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - Chandna
 
Zsl cloud-management-made-easier-with-scm
Zsl cloud-management-made-easier-with-scmZsl cloud-management-made-easier-with-scm
Zsl cloud-management-made-easier-with-scm
 

Viewers also liked

How to effectively use ISO 27001 Certification and SOC 2 Reports
How to effectively use ISO 27001 Certification and SOC 2 ReportsHow to effectively use ISO 27001 Certification and SOC 2 Reports
How to effectively use ISO 27001 Certification and SOC 2 Reports
Salvi Jansen
 
BCP Awareness
BCP Awareness BCP Awareness
BCP Awareness
Imad Almurib
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
Naresh Rao
 
ISO 27001:2013 - Changes
ISO 27001:2013 -  ChangesISO 27001:2013 -  Changes
ISO 27001:2013 - Changes
n|u - The Open Security Community
 
Infosec Audit Lecture_4
Infosec Audit Lecture_4Infosec Audit Lecture_4
Infosec Audit Lecture_4
Obrina Candra, CISA, ISMS-LA
 
ISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_List
SriramITISConsultant
 
7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation
PECB
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
Tanmay Shinde
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
Business Beam
 
Iso 27001 transition to 2013 03202014
Iso 27001 transition to 2013   03202014Iso 27001 transition to 2013   03202014
Iso 27001 transition to 2013 03202014
DQS Inc.
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedure
Uppala Anand
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard Requirements
Uppala Anand
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
Tanmay Shinde
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
Ahmed Riad .
 

Viewers also liked (14)

How to effectively use ISO 27001 Certification and SOC 2 Reports
How to effectively use ISO 27001 Certification and SOC 2 ReportsHow to effectively use ISO 27001 Certification and SOC 2 Reports
How to effectively use ISO 27001 Certification and SOC 2 Reports
 
BCP Awareness
BCP Awareness BCP Awareness
BCP Awareness
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
ISO 27001:2013 - Changes
ISO 27001:2013 -  ChangesISO 27001:2013 -  Changes
ISO 27001:2013 - Changes
 
Infosec Audit Lecture_4
Infosec Audit Lecture_4Infosec Audit Lecture_4
Infosec Audit Lecture_4
 
ISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_List
 
7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 
Iso 27001 transition to 2013 03202014
Iso 27001 transition to 2013   03202014Iso 27001 transition to 2013   03202014
Iso 27001 transition to 2013 03202014
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedure
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard Requirements
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 

Similar to Cloud security and privacy

Nils Puhlmann Ncoic Slides
Nils Puhlmann Ncoic SlidesNils Puhlmann Ncoic Slides
Nils Puhlmann Ncoic Slides
GovCloud Network
 
Cloud Security Alliance - Guidance
Cloud Security Alliance - GuidanceCloud Security Alliance - Guidance
Cloud Security Alliance - Guidance
Subra Kumaraswamy CISSP CISM
 
Envisioning the cloud_presentation deck
Envisioning the cloud_presentation deckEnvisioning the cloud_presentation deck
Envisioning the cloud_presentation deck
drjunwang
 
Zubair
ZubairZubair
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
L S Subramanian
 
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
Amazon Web Services
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Stefaan Van daele
 
Appistry Cloud Computing for Government Featuring FedEx
Appistry Cloud Computing for Government Featuring FedExAppistry Cloud Computing for Government Featuring FedEx
Appistry Cloud Computing for Government Featuring FedEx
Appistry
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
Sergio Loureiro
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
IBM Security
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
Symantec
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
Capgemini
 
Security Concerns in Cloud Computing
Security Concerns in Cloud ComputingSecurity Concerns in Cloud Computing
Security Concerns in Cloud Computing
ijtsrd
 
Slides 530 a2
Slides 530 a2Slides 530 a2
Slides 530 a2
onlineservice530
 
The Practitioner's Guide to Cloud Security
The Practitioner's Guide to Cloud SecurityThe Practitioner's Guide to Cloud Security
The Practitioner's Guide to Cloud Security
Zohar Alon
 
Public Cloud vs Private Cloud vs Hybrid Cloud - What's The Difference.pdf
Public Cloud vs Private Cloud vs Hybrid Cloud - What's The Difference.pdfPublic Cloud vs Private Cloud vs Hybrid Cloud - What's The Difference.pdf
Public Cloud vs Private Cloud vs Hybrid Cloud - What's The Difference.pdf
Riya Soni
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Piyush Mittal
 
IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...
IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...
IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...
Vincent Kwon
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Karthik Sankar
 
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Amazon Web Services
 

Similar to Cloud security and privacy (20)

Nils Puhlmann Ncoic Slides
Nils Puhlmann Ncoic SlidesNils Puhlmann Ncoic Slides
Nils Puhlmann Ncoic Slides
 
Cloud Security Alliance - Guidance
Cloud Security Alliance - GuidanceCloud Security Alliance - Guidance
Cloud Security Alliance - Guidance
 
Envisioning the cloud_presentation deck
Envisioning the cloud_presentation deckEnvisioning the cloud_presentation deck
Envisioning the cloud_presentation deck
 
Zubair
ZubairZubair
Zubair
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
 
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
 
Appistry Cloud Computing for Government Featuring FedEx
Appistry Cloud Computing for Government Featuring FedExAppistry Cloud Computing for Government Featuring FedEx
Appistry Cloud Computing for Government Featuring FedEx
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
 
Security Concerns in Cloud Computing
Security Concerns in Cloud ComputingSecurity Concerns in Cloud Computing
Security Concerns in Cloud Computing
 
Slides 530 a2
Slides 530 a2Slides 530 a2
Slides 530 a2
 
The Practitioner's Guide to Cloud Security
The Practitioner's Guide to Cloud SecurityThe Practitioner's Guide to Cloud Security
The Practitioner's Guide to Cloud Security
 
Public Cloud vs Private Cloud vs Hybrid Cloud - What's The Difference.pdf
Public Cloud vs Private Cloud vs Hybrid Cloud - What's The Difference.pdfPublic Cloud vs Private Cloud vs Hybrid Cloud - What's The Difference.pdf
Public Cloud vs Private Cloud vs Hybrid Cloud - What's The Difference.pdf
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...
IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...
IBM Global Technology Services - Resilience - The Silver Lining to Cloud Comp...
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 

Cloud security and privacy

  • 1. “Head
in
the
clouds,
feet
on
the
 ground
‐
the
business
side
of
 security
in
the
cloud”

 Subra
Kumaraswamy
 subra.k@gmail.com
 Twi=er
‐
@Subrak

 Dec
07,
2009
 www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 1
 Copyright © 2009 Information Security Forum Limited 1
  • 2. Cloud Computing: Evolution www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 2 2
  • 3. 5 Essential Cloud Characteristics •  On-demand self-service •  Broad network access •  Resource pooling -  Location independence •  Rapid elasticity •  Measured service www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 3 3
  • 4. 3 Cloud Service Models •  Cloud Software as a Service (SaaS) -  Use provider’s applications over a network •  Cloud Platform as a Service (PaaS) -  Deploy customer-created applications to a cloud •  Cloud Infrastructure as a Service (IaaS) -  Rent processing, storage, network capacity, and other fundamental computing resources •  To be considered “cloud” they must be deployed on top of cloud infrastructure that has the key characteristics www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 4 4
  • 5. Cloud Pyramid of Flexibility www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 5 5
  • 6. 4 Cloud Deployment Models •  Private cloud -  enterprise owned or leased •  Community cloud -  shared infrastructure for specific community •  Public cloud -  Sold to the public, mega-scale infrastructure •  Hybrid cloud -  composition of two or more clouds www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 6 6
  • 7. The Cloud: How are people using it? 7 www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 7
  • 8. Changing IT Relationships www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 8
  • 9. What Not a Cloud? 9 www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 9
  • 10. Focusing the Security Discussion IaaS, Hybrid, Application Domains HPC/ SaaS, Analytics Public, CRM Private Software as a Service Hybrid Public XaaS Layers Platform as a Service Infrastructure as a Service IaaS, Public, Transcoding www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 10
  • 11. Components of Information Security Encryption, Data masking, Content protection Application-level Host-level Network-level www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 11
  • 12. Analyzing Cloud Security •  Some key issues: -  Trust, multi-tenancy, encryption, key management compliance •  Clouds are massively complex systems can be reduced to simple primitives that are replicated thousands of times and common functional units •  Cloud security is a tractable problem -  There are both advantages and challenges www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 12
  • 13. Balancing Threat Exposure and Cost Effectiveness •  Private clouds may have less threat exposure than community or hosted clouds which have less threat exposure than public clouds. •  Massive public clouds may be more cost effective than large community clouds which may be more cost effective than small private clouds. www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 13
  • 14. General Security Advantages •  Democratization of security capabilities •  Shifting public data to a external cloud reduces the exposure of the internal sensitive data •  Forcing functions to add security controls •  Clouds enable automated security management •  Redundancy / Disaster Recovery www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 14
  • 15. General Security Challenges •  Trusting vendor’s security model •  Customer inability to respond to audit findings •  Obtaining support for investigations •  Indirect administrator accountability •  Proprietary implementations can’t be examined •  Loss of physical control www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 15
  • 16. Infrastructure Security Trust boundaries have moved •  Specifically, customers are unsure where those trust boundaries have moved to •  Established model of network tiers or zones no longer exists - Domain model does not fully replicate previous model •  No viable (scalable) model for host-to-host trust •  Data labeling/tagging required at application-level - Data separation is logical, not physical www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 16 16
  • 17. Data Security •  Provider’s data collection efforts and monitoring of such (e.g., IPS, NBA) •  Use of encryption —  Point-to-multipoint data-in-transit an issue —  Data-at-rest possibly not encrypted —  Data being processed definitely not encrypted —  Key management is a significant issue —  Advocated alternative methods (e.g., obfuscation, redaction, truncation) are not adequate •  Data lineage, provenance •  Data remanence www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 17 17
  • 18. Identity and Access Management (IAM) Generally speaking, poor situation today: •  Provisioning of user access is proprietary to provider •  Strong authentication available only through delegation •  Federated identity widely not available •  User profiles are limited to “administrator” and “user” •  Privilege management is coarse, not granular www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 18 18
  • 19. Privacy Considerations Transborder data issues may be exacerbated •  Specifically, where are cloud computing activities occurring? Data governance is weak •  Encryption is not pervasive •  Data remanence receives inadequate attention •  CSPs absolve themselves of privacy concerns: “We don’t look at your data” www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 19 19
  • 20. Audit & Compliance Considerations •  Effectiveness of current audit frameworks questionable (e.g., SAS 70 Type II) •  CSP users need to define: - their control requirements - understand their CSP’s internal control monitoring processes -  analyze relevant external audit reports •  Issue is assurance of compliance www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 20 20
  • 21. Impact on Role of Corporate IT •  Governance issue as internal IT becomes “consultants” and business analysts to business units •  Delineation of responsibilities between providers and customers much more nebulous than between customers and outsourcers, collocation facilities, or ASPs •  Cloud computing likely to involve much more direct business unit interaction with CSPs than with other providers previously www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 21 21
  • 22. Getting Ready – IT Security •  Governance framework that can be aligned with partners •  Federation of Identity, strong authentication, privileged access and key management •  Classification of data and privacy policy for data in cloud •  Security Automation – Image standardization, user/ network policy template •  Understand the cloud service provider security architecture, SLA, policies, security feature and interfaces •  Understand the ephemeral nature of compute and storage cloud and plan for archival of security logs www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 22
  • 23. Conclusions •  Part of customers’ infrastructure security moves beyond their control •  Provider’s infrastructure security may (enterprise) or may not (SMB) be less robust than customers’ expectations •  Data security becomes significantly more important – yet provider capabilities are inadequate (except for simple storage which can be encrypted, and processing of non-sensitive (unregulated and unclassified) data www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 23 23
  • 24. Conclusions (continued) •  IAM is less than adequate for enterprises – weak management of weak credentials unless (authentication) delegated back to customers •  Because of above, expect significant business unit pressure to desensitize or anonymize data; expect this to become a chokepoint -  No established standards for obfuscation, redaction, or truncation www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 24 24
  • 25. Conclusions (continued) •  Relationship between business units and corporate IT departments vis-à-vis CSPs will shift greater power to business units from IT •  Number of functions performed today by corporate IT departments will shift to CSPs, along with corresponding job positions www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 25 25
  • 26. What’s Good about the Cloud? •  A lot! Both for enterprises and SMBs – for handling of non-sensitive (unregulated and unclassified) data •  Cost •  Flexibility •  Scalability •  Speed www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 Copyright © 2009 Information Security Forum Limited 26 26
  • 27. Thank
you
 subra.k@gmail.com
 Twi=er
‐
@subrak

 Disclaimer

 The
views
and
opinions
expressed
during
this
conference
are
those
of
the
speakers
and
do
not
necessarily
reflect
the
views
and
 opinions
held
by
Sun
Microsystems.

Nothing
in
this
conference
should
be
construed
as
professional
or
legal
advice
or
as
creaGng
a
 professional‐customer
or
a=orney‐client
relaGonship.

If
professional,
legal,
or
other
expert
assistance
is
required,
the
services
of
a
 competent
professional
should
be
sought.
 Dec
7th,
2009
 www.securityforum.org Cloud ISF 20th Annual World Subra Kumaraswamy Security and privacy – Congress 2009 27
 Copyright © 2009 Information Security Forum Limited 27