Securing the Cloud (Don’t get lost in the fog) Chris Munt M/Gateway Developments Ltd
Topics Real World View Assessing risk Corporate/Lawyers View Analysis of commercial risk Technical View Using technology to mitigate risk
Real world view
Assessing risk What risks are you exposed to?
Assessing risk
Assessing risk Indentify weaknesses
Assessing risk Can technology help?
Assessing risk Source: XKCD web comic:  http://xkcd.com/
Assessing risk Lost in the fog of fanciful terms used to describe technology?
Assessing risk Cyberspace Virtualization Cloud computing Private Cloud Public Cloud Hybrid Cloud Cloudware IaaS, PaaS, SaaS
Assessing risk Cloud Computing Real computers
Real databases
Real networks Who’s watching you?
Assessing risk What about human factors?
Assessing risk
Assessing risk
Assessing risk “ You must change your password every few weeks and it must be constructed from no less than twelve characters which will include a mixture of upper and lower case letters, digits and punctuation characters”
Assessing risk Security versus Convenience?
Assessing risk
Assessing risk Why would anyone want to break your security?
Assessing risk
Assessing risk What’s your data worth to you? What’s it worth to someone else?
Assessing risk Lindisfarne Castle, Holy Island ~1797 by Thomas Girtin (1775–1802)
Assessing risk Best security is data locked in a secure room Not practical Sensible compromise required Must be practical with safeguards against all  likely  risks
Corporate/Lawyers view
Cloud Computing: Risks to an organization Focus on Security and Accountability
Gartner report June 2008 Identify seven areas of risk
Suggest questions to be directed at service provider
Reference: http://www.infoworld.com/article/08/07/02/Gartner_Seven_cloudcomputing_security_risks_1.html
User Access Risk Privileged user access Who has access to your data?
Who administers the systems?
Governance
Regulatory Compliance  Risk You are ultimately responsible for the security and integrity of your own data What is in your data?
Do you store sensitive information about others?
Is the supplier subject to external audit in the same way as conventional suppliers of outsourcing solutions?
Data Location Risk You probably have no control of where your data is physically held Can you insist that it be held within a certain jurisdiction?
Can the Cloud provider sign up to local privacy requirements on behalf of their customers?
Data Segregation Risk Your data is usually stored in shared environments along with the data of other customers. Ask about encryption schemes used and how they are verified
Assess risk of encryption accidents Possibility of rendering data unreadable
Risks Associated With Recovery Even with modern equipment disasters can (and do) still happen Can the supplier do a complete recovery?
How long will a full recovery take?
Granularity of recovery?
Risks inherent in investigating security breaches and illegal activity Inherent difficulty in investigating illegal activity in shared environments To what extent can the supplier support investigative work?
To what extent do  you  have to account for illegal activity involving your application and/or data?
Risks associated with sustainability Long term viability of supplier What happens if the supplier goes bust?
What happens if the supplier is taken over by another company?
How would you get your data back (and port it to another platform) if you needed to?
Technical view
Cloud Computing: Security Standards compliance Credit Card transactions Payment Card Industry – PCI compliance 4 Levels Confidential data Medical records

Securing The Cloud