SlideShare a Scribd company logo
Cloud Security & Mitigating Vulnerabilities
IAPP Knowledge Net
October 4, 2016
Tony UcedaVelez, CISM, CISA, GSEC, CRISC Richard N. Sheinis, CIPP-US
Versprite Hall Booth Smith, PC
10 Glenlake Parkway 13950 Ballantyne Corporate Place
Suite 130 Suite 175
Atlanta, Georgia 30328 Charlotte, NC 28277
tonyuv@versprite.com rsheinis@hallboothsmith.com
(678) 278-8312 (office) (980) 859-0380 (office)
(404) 345-0749 (mobile)
Cloud Insecurity & Privacy Abuse
The Dawn of the Information Matrix
Speaker Bio
 CEO, VerSprite – Global Security Consulting Firm
(www.versprite.com)
 Chapter Leader – OWASP Atlanta
 Author, “Risk Centric Threat Modeling – Process for
Attack Simulation & Threat Analysis”, Wiley June
2015
 Former Sr. Security Director, Fortune 50 | Symantec |
Dell-Secureworks
 ~20 years of global Information Security for various
MNCs
 Founded in 2007, Self Funded
 Employees across 4 Countries |
Serving the needs of nearly 10
countries world wide
 Blackhat meets Suit meets Risk
 Services in AppSec, GRC, Incident
Response, and Security Operations.
 Vendor Risk, Business Impact
Analysis, Security Architecture,
Enterprise Security Risk Analysis,
Threat Models, Penetration Testing
(Mobile, Web, Cloud)
 FedRamp, FISMA, PCI-DSS, HIPAA,
ISO 27001, EI3PA, NERC CIP, CSA,
FCRA, EU Data Privacy
About VerSprite
T R U E S P I R I T E D S E C U R I T Y
Flying Beyond the Cloud
Understanding Beyond Today’s IaaS | PaaS | SaaS | CaaS
Revisiting Key Drivers to Cloud
C L O U D T O M AT R I X F O R M AT I O N
o Dynamic OnPrem environments too costly to manage in long run
o $avings across licensing, network/sys administration,
o Dynamic networks || systems || apps need to respond to growing,
diversified threats
Atmospheric Shift to Agile
C L O U D T O M AT R I X F O R M AT I O N
o Companies becoming more Agile
o Agile development requires more agile environments
o Other key drivers for flying to the Cloud
o Business continuity and network resiliency
oRisk transference opportunities (e.g.. – SLAs, security, compliance, etc..)
o DevOps a new frontier for Cloud Management
oFarming agile services via codified configs
o Spinning up new services w/ control panels
o Virtualization at all levels
Frameworks Trending in the Cloud
F R A M E W O R K S O B F U S C AT E S E C U R I T Y & P R I VA C Y
o Macro Frameworks
oMeant for experienced developers
oHas many built in components to
facilitate authentication, encryption,
& security
o Micro-Frameworks
oGaining Lightweight, quick to get
started
oMeant for websites and smaller
applications
o JavaScript Frameworks
oProvides crisp UI to interface with
web frameworks
Weather Conditions in Cloud
Operations
Process immaturity, security obfuscation, & the rush to B2B/ B2C service
dominance
Cloud Security Realism
“The more things change, the more things
remain the same”
CSPs started
w/ operational
fails in
resiliency
AWS, Salesforce,
Microsoft, Google,
Verizon have all
had problems
maintaining uptime
Mistakes
happen.
Humans still
run the cloud
“Through 2020,
95% of cloud
security failures
will be the
customer's
fault.” -Gartner
Most placated by
certs; no real
understanding on
security
30% of
Docker
images have
high level of
security vulns
Included
Shellshock &
Heartbleed
Obfuscated
security via
security
certifications
CSPs will
continue to drive
efficiency in their
infrastructure
while transferring
risk to customers.
Misconfiguration
s, poor ACLs,
rogue changes
can still happen
Holding CSPs Accountable
P E O P L E , P R O C E S S , T E C H N O L O G Y C O N S I D E R AT I O N S
o People: Look at turnover & industry reputation for IT personnel
oDo you know the culture at your CSP where you have your business running?
o Culture helps abide to key processes in change control, incident response, secure DevOps,
& other key processes
o Process:
oUnderstand their responsibility matrix
oVendor reviews can should be done against CSPs (bake into MSA)
oCompliance based certifications as well; some better than others
o Good Certifications (ISO 27001, FedRamp, PCI-DSS)
o ‘Meh’ Certifications (SSAE 16, Privacy Shield, other self certs)
o Contractual Agreements
o Technology
oSee their security evidence of pen testing
oTest and test often (e.g. – pen testing, web app testing, etc.)
Balancing Security Accountability
C L O U D S E C U R I T Y W I L L U LT I M AT E LY B E U P T O C O N S U M E R S
METRICS AROUND
CLOUD OPS
INTEGRATED
ARCHITECTURE INSIGHT
SECURITY TESTING ACROSS
LAYERS
INFORMATION MAPPING &
GOVERNANCE
INCIDENT/ EVENT
MONITORING
AUDIT & REPORTING
CRYPTO & OTHER KEY
CONTROL IMPLEMENTATIONS
BUSINESS IMPACT ANALYSIS
INSIDERS/ HUMAN ERROR
Rise of the APIs
REST, JSON, SOAP facilitate data exchange known by few and managed
by fewer.
Proliferation of APIs Warrant Vigilance
D ATA E X C H A N G E S C A N E A S I LY G E T O U T O F H A N D
o Application Programming Interfaces
o Generally over HTTPS using JSON, SOAP, and REST data interfaces
o Can be run as authenticated or anonymous auth models
o Interfaces support multiple different method calls
o Can be public or private
o Be wary of zombie APIs
o APIs becoming de-facto data exchange
o Mobile clients hit exposed APIs
o Greater integration with 3rd parties
o OpenID Auth, Content partners
o Partnerships w/ Federal governments and Big Business
o Critical Security Areas
o Places emphasis on good crypto
o Privilege level is critical; who is making the programmatic calls?
o RBAC model for end users
o Audit trails and monitoring
o Cloud related network ACLs
DevOps, APIs, and Your Data
How Architecture and Data Classification must be at the forefront of
your Cloud related operations.
Defining system images.
Managing configurations via
manifests. Testing 3rd party
frameworks/ libraries. Locking
down system, application, and
DB accounts, environment
hardening, pre-emptive
compliance.
1. Inspecting DevOps
Leverage secure frameworks,
build security & privacy-into
design model, manage good
crypto (encryption + hashing),
govern API endpoints, CRUD
exercises for API actors,
integrated
2. API Security
Data Retention Policy for Apps &
DBs. Crypto considerations for
data at rest | transit, Data Flow
Diagrams (DFDs), embracing
PIAs for data governance for
Cloud based APIs
3. Data Architecture
Prescriptive Privacy Guidance for Cloud Adoption
Best practices to limit data loss and data mishandling
Privacy Considerations to Live By
2 1 S T C E N T U R Y B I G B R O T H E R D ATA C O L L E C T O R S
o Business Need to Know
o Important for companies to conduct PIAs to validate their product groups
need to know and be held accountable
o Demonstrate relevance to pre-existing business objectives
o Approved/ Authorized Use
o Have the users provided consent?
o Have they been made clear in terms of data usage of PII?
o Has the PII been explicitly defined?
o Retention
o How long is the data needed to be retained?
o Storage periods: in-memory, online storage, off line storage
o Minimize liability by using and then discarding if not legally needed or required by
business
o Ensure Protection
o Controls aimed for cryptographic storage of PII
o Should review security controls associated with DFD
Top Threats to Consider
M O R E O F T H E S A M E , B U T M O R E S O P H I S T I C AT E D
o Reason Old Threats Still Successful
oWeb technologies carry much of the OWASP Top 10 that still apply
oData pilfering still leading threat motive (1. Healthcare 2.
Hospitality 3. Higher Ed 4. SMBs 5. Retail
o Exploiting Old Weaknesses
oFrameworks facilitate obfuscation of security
oMicro frameworks negate many security libraries found in fuller
web application frameworks
o Injection based flaws: XSS, SQLi, CSRF
o Implicit Trust Models (Company A Web API Trusts Company B Web API)
o Poor Access Control (RBAC) Models
o Negligible Audit and Monitoring Controls
o New Threats
oDishing (introducing contaminated images or containers)
Best Practices in Managing Privacy/
Security in Cloud OperationsGOVERNANCE ASSESS RISK
REMEDIATE & MEASURE
VISIBILITY AROUND RISK
ISSUES NEED TO HAPPEN
VERTICALLY & HORIZONTALLY
RISK ISSUES NEED TO
CORRELATE TO BUSINESS
IMPACT AREAS & THREATS TO
THE ORGANIZATION
REMEDIATION EFFORTS SHOULD BE
MEASURED & MEASURED AGAINST KEY
RISK INDICATORS TO SHOW PROGRESS
THREAT ANALYSIS
KNOWING TODAY’S THREATS &
HOW THEY RELATE TO A
COMPANY’S HIGHEST TARGET
AREAS IS KEY
ATTACK SURFACE MANAGE RISK
COMPANIES NEED TO KNOW THEIR IT
FOOTPRINT AND OFTEN DID NOT
KNOW THE EXTENT OF THEIR IT,
PHYSICAL, OR VENDOR FOOTPRINT
RISK ISSUES NEED ONGOING
MANAGEMENT WHERE
ASSESSMENTS FEED A RISK
REGISTER
1. Limitation of damages liability provisions
2. Insurance
3. Compliance audits
4. Security requirements
5. Subcontracting
6. Access monitoring
Mitigating Risk Through Negotiation
Examples
IN NO EVENT SHALL VENDORS OR ANY OF ITS SUPPLIERS’ AND LICENSORS’ TOTAL
AGGREGATE LIABILITY UNDER THIS AGREEMENT EXCEED THE TOTAL AMOUNT OF FEES
RECEIVED BY VENDOR FROM CUSTOMER UNDER THIS AGREEMENT IN THE THREE (3)
MONTH PERIOD PRECEDING THE EVENT GIVING RISE TO THE CLAIM.
The exclusions and limitations in this Section 10 shall not apply to:
a. Losses arising out of or relating to a party’s failure to comply with its
obligations under Section 8 (Confidentiality), Exhibit “C” (Data Privacy and Security
Requirements) or the Business Associate Agreement between the parties.
At all times during the Term and for a period of three (3) years thereafter, Vendor shall
procure and maintain, at its sole cost and expense, all insurance coverage required by
applicable law and in any event insurance coverage in the following types and amounts:
a. Cyber Liability Insurance, including first party and third party coverage
with limits no less than $2,000,000.00 per occurrence and $5,000,000.00 in the
aggregate for all claims each policy year.
Subcontracting
Vendor shall not subcontract any Services, in whole or in part, without
Customer’s prior written consent, which consent shall not be unreasonably withheld or
delayed. Without limiting the foregoing:
a. Customer’s consent to any such Subcontractor shall not relieve Vendor
or its representations, warranties, or obligations under this Agreement.
b. Vendor shall remain responsible and liable for any and all (i)
performance required hereunder, including the proper supervision, coordination and
performance of the Services; and (ii) acts and omissions of each Subcontractor
(including such Subcontractor’s employees and agents), are deemed Vendor’s acts and
omissions to the same extent as if such acts or omissions were by Vendors.
c. Any noncompliance by any Subcontractor or its employees or agents
with the provisions of this Agreement or any Service Order will constitute a breach by
Vendor.
EXHIBIT C
DATA PRIVACY AND SECURITY REQUIREMENTS
In addition to any other data or Protected Health Information (“PHI”)
requirements stated in the Agreement, Vendor agrees to the following:
1. Confidential Information
2. HIPAA compliance (BAA)
3. Specific security measures (i.e., access, monitoring, reporting)
4. Access to system by vendor
5. Security questionnaire
6. Redundancy
7. Data Back-up
8. Disaster Recovery
Questions?

More Related Content

What's hot

CWTSBWEB022416 (1)
CWTSBWEB022416 (1)CWTSBWEB022416 (1)
CWTSBWEB022416 (1)
Greg Posten
 
Csa summit who can protect us education for cloud security professionals
Csa summit   who can protect us education for cloud security professionalsCsa summit   who can protect us education for cloud security professionals
Csa summit who can protect us education for cloud security professionals
CSA Argentina
 
Webinar: "How to invest efficiently in cybersecurity (Return on Security Inv...
Webinar: "How to invest efficiently in cybersecurity  (Return on Security Inv...Webinar: "How to invest efficiently in cybersecurity  (Return on Security Inv...
Webinar: "How to invest efficiently in cybersecurity (Return on Security Inv...
Berezha Security Group
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
Dean Iacovelli
 
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Positive Hack Days
 
Csa summit la transformación digital y el nuevo rol del ciso
Csa summit   la transformación digital y el nuevo rol del cisoCsa summit   la transformación digital y el nuevo rol del ciso
Csa summit la transformación digital y el nuevo rol del ciso
CSA Argentina
 
Don't Get Left In The Dust How To Evolve From Ciso To Ciro
Don't Get Left In The Dust How To Evolve From Ciso To CiroDon't Get Left In The Dust How To Evolve From Ciso To Ciro
Don't Get Left In The Dust How To Evolve From Ciso To Ciro
Priyanka Aash
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
Sanjay Chadha, CPA, CA
 
Decision criteria and analysis for hardware-based encryption
Decision criteria and analysis for hardware-based encryptionDecision criteria and analysis for hardware-based encryption
Decision criteria and analysis for hardware-based encryption
Thales e-Security
 
Best Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesBest Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting Breaches
Splunk
 
CISO Case Study 2011 V2
CISO Case Study  2011 V2CISO Case Study  2011 V2
CISO Case Study 2011 V2
candy_alexander
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
Security Fact & Fiction: Three Lessons from the Headlines
Security Fact & Fiction: Three Lessons from the HeadlinesSecurity Fact & Fiction: Three Lessons from the Headlines
Security Fact & Fiction: Three Lessons from the Headlines
Duo Security
 
Certifications on Security - IS AUDIT
Certifications on Security - IS AUDITCertifications on Security - IS AUDIT
Certifications on Security - IS AUDIT
Shahzeb Pirzada
 
Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test Professionals
TechWell
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
manoharparakh
 
A successful application security program - Envision build and scale
A successful application security program - Envision build and scaleA successful application security program - Envision build and scale
A successful application security program - Envision build and scale
Priyanka Aash
 
IRJET- Cloud Computing Securites and Issues
IRJET- Cloud Computing Securites and IssuesIRJET- Cloud Computing Securites and Issues
IRJET- Cloud Computing Securites and Issues
IRJET Journal
 
Protecting application delivery without network security blind spots
Protecting application delivery without network security blind spotsProtecting application delivery without network security blind spots
Protecting application delivery without network security blind spots
Thales e-Security
 
Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for Dummies
Liberteks
 

What's hot (20)

CWTSBWEB022416 (1)
CWTSBWEB022416 (1)CWTSBWEB022416 (1)
CWTSBWEB022416 (1)
 
Csa summit who can protect us education for cloud security professionals
Csa summit   who can protect us education for cloud security professionalsCsa summit   who can protect us education for cloud security professionals
Csa summit who can protect us education for cloud security professionals
 
Webinar: "How to invest efficiently in cybersecurity (Return on Security Inv...
Webinar: "How to invest efficiently in cybersecurity  (Return on Security Inv...Webinar: "How to invest efficiently in cybersecurity  (Return on Security Inv...
Webinar: "How to invest efficiently in cybersecurity (Return on Security Inv...
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
 
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
 
Csa summit la transformación digital y el nuevo rol del ciso
Csa summit   la transformación digital y el nuevo rol del cisoCsa summit   la transformación digital y el nuevo rol del ciso
Csa summit la transformación digital y el nuevo rol del ciso
 
Don't Get Left In The Dust How To Evolve From Ciso To Ciro
Don't Get Left In The Dust How To Evolve From Ciso To CiroDon't Get Left In The Dust How To Evolve From Ciso To Ciro
Don't Get Left In The Dust How To Evolve From Ciso To Ciro
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
Decision criteria and analysis for hardware-based encryption
Decision criteria and analysis for hardware-based encryptionDecision criteria and analysis for hardware-based encryption
Decision criteria and analysis for hardware-based encryption
 
Best Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesBest Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting Breaches
 
CISO Case Study 2011 V2
CISO Case Study  2011 V2CISO Case Study  2011 V2
CISO Case Study 2011 V2
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Security Fact & Fiction: Three Lessons from the Headlines
Security Fact & Fiction: Three Lessons from the HeadlinesSecurity Fact & Fiction: Three Lessons from the Headlines
Security Fact & Fiction: Three Lessons from the Headlines
 
Certifications on Security - IS AUDIT
Certifications on Security - IS AUDITCertifications on Security - IS AUDIT
Certifications on Security - IS AUDIT
 
Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test Professionals
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 
A successful application security program - Envision build and scale
A successful application security program - Envision build and scaleA successful application security program - Envision build and scale
A successful application security program - Envision build and scale
 
IRJET- Cloud Computing Securites and Issues
IRJET- Cloud Computing Securites and IssuesIRJET- Cloud Computing Securites and Issues
IRJET- Cloud Computing Securites and Issues
 
Protecting application delivery without network security blind spots
Protecting application delivery without network security blind spotsProtecting application delivery without network security blind spots
Protecting application delivery without network security blind spots
 
Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for Dummies
 

Similar to Unc charlotte prezo2016

Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb final
Christophe Monnier
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
Michael Ofarrell
 
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudSimplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Happiest Minds Technologies
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated Environments
DevOps.com
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Tudor Damian
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
Amazon Web Services
 
To Cloud or Not To Cloud
To Cloud or Not To CloudTo Cloud or Not To Cloud
To Cloud or Not To Cloud
Michael Yung
 
To cloud or not to cloud
To cloud or not to cloudTo cloud or not to cloud
To cloud or not to cloud
Alejandro De La Borbolla Ruiz
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
EC-Council
 
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
David Spinks
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Happiest Minds Technologies
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
Eryk Budi Pratama
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
Fahmi Albaheth
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
Raj Sarode
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
Sirius
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
Kurt Hagerman
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
sucesuminas
 
Governing in the Cloud
Governing in the CloudGoverning in the Cloud
Governing in the Cloud
Rolf Frydenberg
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptx
Symptai Consulting Limited
 

Similar to Unc charlotte prezo2016 (20)

Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb final
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudSimplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated Environments
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
 
To Cloud or Not To Cloud
To Cloud or Not To CloudTo Cloud or Not To Cloud
To Cloud or Not To Cloud
 
To cloud or not to cloud
To cloud or not to cloudTo cloud or not to cloud
To cloud or not to cloud
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
 
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Governing in the Cloud
Governing in the CloudGoverning in the Cloud
Governing in the Cloud
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptx
 

Recently uploaded

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 

Recently uploaded (20)

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 

Unc charlotte prezo2016

  • 1. Cloud Security & Mitigating Vulnerabilities IAPP Knowledge Net October 4, 2016 Tony UcedaVelez, CISM, CISA, GSEC, CRISC Richard N. Sheinis, CIPP-US Versprite Hall Booth Smith, PC 10 Glenlake Parkway 13950 Ballantyne Corporate Place Suite 130 Suite 175 Atlanta, Georgia 30328 Charlotte, NC 28277 tonyuv@versprite.com rsheinis@hallboothsmith.com (678) 278-8312 (office) (980) 859-0380 (office) (404) 345-0749 (mobile)
  • 2. Cloud Insecurity & Privacy Abuse The Dawn of the Information Matrix
  • 3. Speaker Bio  CEO, VerSprite – Global Security Consulting Firm (www.versprite.com)  Chapter Leader – OWASP Atlanta  Author, “Risk Centric Threat Modeling – Process for Attack Simulation & Threat Analysis”, Wiley June 2015  Former Sr. Security Director, Fortune 50 | Symantec | Dell-Secureworks  ~20 years of global Information Security for various MNCs
  • 4.  Founded in 2007, Self Funded  Employees across 4 Countries | Serving the needs of nearly 10 countries world wide  Blackhat meets Suit meets Risk  Services in AppSec, GRC, Incident Response, and Security Operations.  Vendor Risk, Business Impact Analysis, Security Architecture, Enterprise Security Risk Analysis, Threat Models, Penetration Testing (Mobile, Web, Cloud)  FedRamp, FISMA, PCI-DSS, HIPAA, ISO 27001, EI3PA, NERC CIP, CSA, FCRA, EU Data Privacy About VerSprite T R U E S P I R I T E D S E C U R I T Y
  • 5. Flying Beyond the Cloud Understanding Beyond Today’s IaaS | PaaS | SaaS | CaaS
  • 6. Revisiting Key Drivers to Cloud C L O U D T O M AT R I X F O R M AT I O N o Dynamic OnPrem environments too costly to manage in long run o $avings across licensing, network/sys administration, o Dynamic networks || systems || apps need to respond to growing, diversified threats
  • 7. Atmospheric Shift to Agile C L O U D T O M AT R I X F O R M AT I O N o Companies becoming more Agile o Agile development requires more agile environments o Other key drivers for flying to the Cloud o Business continuity and network resiliency oRisk transference opportunities (e.g.. – SLAs, security, compliance, etc..) o DevOps a new frontier for Cloud Management oFarming agile services via codified configs o Spinning up new services w/ control panels o Virtualization at all levels
  • 8. Frameworks Trending in the Cloud F R A M E W O R K S O B F U S C AT E S E C U R I T Y & P R I VA C Y o Macro Frameworks oMeant for experienced developers oHas many built in components to facilitate authentication, encryption, & security o Micro-Frameworks oGaining Lightweight, quick to get started oMeant for websites and smaller applications o JavaScript Frameworks oProvides crisp UI to interface with web frameworks
  • 9. Weather Conditions in Cloud Operations Process immaturity, security obfuscation, & the rush to B2B/ B2C service dominance
  • 10. Cloud Security Realism “The more things change, the more things remain the same” CSPs started w/ operational fails in resiliency AWS, Salesforce, Microsoft, Google, Verizon have all had problems maintaining uptime Mistakes happen. Humans still run the cloud “Through 2020, 95% of cloud security failures will be the customer's fault.” -Gartner Most placated by certs; no real understanding on security 30% of Docker images have high level of security vulns Included Shellshock & Heartbleed Obfuscated security via security certifications CSPs will continue to drive efficiency in their infrastructure while transferring risk to customers. Misconfiguration s, poor ACLs, rogue changes can still happen
  • 11. Holding CSPs Accountable P E O P L E , P R O C E S S , T E C H N O L O G Y C O N S I D E R AT I O N S o People: Look at turnover & industry reputation for IT personnel oDo you know the culture at your CSP where you have your business running? o Culture helps abide to key processes in change control, incident response, secure DevOps, & other key processes o Process: oUnderstand their responsibility matrix oVendor reviews can should be done against CSPs (bake into MSA) oCompliance based certifications as well; some better than others o Good Certifications (ISO 27001, FedRamp, PCI-DSS) o ‘Meh’ Certifications (SSAE 16, Privacy Shield, other self certs) o Contractual Agreements o Technology oSee their security evidence of pen testing oTest and test often (e.g. – pen testing, web app testing, etc.)
  • 12. Balancing Security Accountability C L O U D S E C U R I T Y W I L L U LT I M AT E LY B E U P T O C O N S U M E R S METRICS AROUND CLOUD OPS INTEGRATED ARCHITECTURE INSIGHT SECURITY TESTING ACROSS LAYERS INFORMATION MAPPING & GOVERNANCE INCIDENT/ EVENT MONITORING AUDIT & REPORTING CRYPTO & OTHER KEY CONTROL IMPLEMENTATIONS BUSINESS IMPACT ANALYSIS INSIDERS/ HUMAN ERROR
  • 13. Rise of the APIs REST, JSON, SOAP facilitate data exchange known by few and managed by fewer.
  • 14. Proliferation of APIs Warrant Vigilance D ATA E X C H A N G E S C A N E A S I LY G E T O U T O F H A N D o Application Programming Interfaces o Generally over HTTPS using JSON, SOAP, and REST data interfaces o Can be run as authenticated or anonymous auth models o Interfaces support multiple different method calls o Can be public or private o Be wary of zombie APIs o APIs becoming de-facto data exchange o Mobile clients hit exposed APIs o Greater integration with 3rd parties o OpenID Auth, Content partners o Partnerships w/ Federal governments and Big Business o Critical Security Areas o Places emphasis on good crypto o Privilege level is critical; who is making the programmatic calls? o RBAC model for end users o Audit trails and monitoring o Cloud related network ACLs
  • 15. DevOps, APIs, and Your Data How Architecture and Data Classification must be at the forefront of your Cloud related operations. Defining system images. Managing configurations via manifests. Testing 3rd party frameworks/ libraries. Locking down system, application, and DB accounts, environment hardening, pre-emptive compliance. 1. Inspecting DevOps Leverage secure frameworks, build security & privacy-into design model, manage good crypto (encryption + hashing), govern API endpoints, CRUD exercises for API actors, integrated 2. API Security Data Retention Policy for Apps & DBs. Crypto considerations for data at rest | transit, Data Flow Diagrams (DFDs), embracing PIAs for data governance for Cloud based APIs 3. Data Architecture
  • 16. Prescriptive Privacy Guidance for Cloud Adoption Best practices to limit data loss and data mishandling
  • 17. Privacy Considerations to Live By 2 1 S T C E N T U R Y B I G B R O T H E R D ATA C O L L E C T O R S o Business Need to Know o Important for companies to conduct PIAs to validate their product groups need to know and be held accountable o Demonstrate relevance to pre-existing business objectives o Approved/ Authorized Use o Have the users provided consent? o Have they been made clear in terms of data usage of PII? o Has the PII been explicitly defined? o Retention o How long is the data needed to be retained? o Storage periods: in-memory, online storage, off line storage o Minimize liability by using and then discarding if not legally needed or required by business o Ensure Protection o Controls aimed for cryptographic storage of PII o Should review security controls associated with DFD
  • 18. Top Threats to Consider M O R E O F T H E S A M E , B U T M O R E S O P H I S T I C AT E D o Reason Old Threats Still Successful oWeb technologies carry much of the OWASP Top 10 that still apply oData pilfering still leading threat motive (1. Healthcare 2. Hospitality 3. Higher Ed 4. SMBs 5. Retail o Exploiting Old Weaknesses oFrameworks facilitate obfuscation of security oMicro frameworks negate many security libraries found in fuller web application frameworks o Injection based flaws: XSS, SQLi, CSRF o Implicit Trust Models (Company A Web API Trusts Company B Web API) o Poor Access Control (RBAC) Models o Negligible Audit and Monitoring Controls o New Threats oDishing (introducing contaminated images or containers)
  • 19. Best Practices in Managing Privacy/ Security in Cloud OperationsGOVERNANCE ASSESS RISK REMEDIATE & MEASURE VISIBILITY AROUND RISK ISSUES NEED TO HAPPEN VERTICALLY & HORIZONTALLY RISK ISSUES NEED TO CORRELATE TO BUSINESS IMPACT AREAS & THREATS TO THE ORGANIZATION REMEDIATION EFFORTS SHOULD BE MEASURED & MEASURED AGAINST KEY RISK INDICATORS TO SHOW PROGRESS THREAT ANALYSIS KNOWING TODAY’S THREATS & HOW THEY RELATE TO A COMPANY’S HIGHEST TARGET AREAS IS KEY ATTACK SURFACE MANAGE RISK COMPANIES NEED TO KNOW THEIR IT FOOTPRINT AND OFTEN DID NOT KNOW THE EXTENT OF THEIR IT, PHYSICAL, OR VENDOR FOOTPRINT RISK ISSUES NEED ONGOING MANAGEMENT WHERE ASSESSMENTS FEED A RISK REGISTER
  • 20. 1. Limitation of damages liability provisions 2. Insurance 3. Compliance audits 4. Security requirements 5. Subcontracting 6. Access monitoring Mitigating Risk Through Negotiation
  • 21. Examples IN NO EVENT SHALL VENDORS OR ANY OF ITS SUPPLIERS’ AND LICENSORS’ TOTAL AGGREGATE LIABILITY UNDER THIS AGREEMENT EXCEED THE TOTAL AMOUNT OF FEES RECEIVED BY VENDOR FROM CUSTOMER UNDER THIS AGREEMENT IN THE THREE (3) MONTH PERIOD PRECEDING THE EVENT GIVING RISE TO THE CLAIM. The exclusions and limitations in this Section 10 shall not apply to: a. Losses arising out of or relating to a party’s failure to comply with its obligations under Section 8 (Confidentiality), Exhibit “C” (Data Privacy and Security Requirements) or the Business Associate Agreement between the parties.
  • 22. At all times during the Term and for a period of three (3) years thereafter, Vendor shall procure and maintain, at its sole cost and expense, all insurance coverage required by applicable law and in any event insurance coverage in the following types and amounts: a. Cyber Liability Insurance, including first party and third party coverage with limits no less than $2,000,000.00 per occurrence and $5,000,000.00 in the aggregate for all claims each policy year.
  • 23. Subcontracting Vendor shall not subcontract any Services, in whole or in part, without Customer’s prior written consent, which consent shall not be unreasonably withheld or delayed. Without limiting the foregoing: a. Customer’s consent to any such Subcontractor shall not relieve Vendor or its representations, warranties, or obligations under this Agreement. b. Vendor shall remain responsible and liable for any and all (i) performance required hereunder, including the proper supervision, coordination and performance of the Services; and (ii) acts and omissions of each Subcontractor (including such Subcontractor’s employees and agents), are deemed Vendor’s acts and omissions to the same extent as if such acts or omissions were by Vendors. c. Any noncompliance by any Subcontractor or its employees or agents with the provisions of this Agreement or any Service Order will constitute a breach by Vendor.
  • 24. EXHIBIT C DATA PRIVACY AND SECURITY REQUIREMENTS In addition to any other data or Protected Health Information (“PHI”) requirements stated in the Agreement, Vendor agrees to the following: 1. Confidential Information 2. HIPAA compliance (BAA) 3. Specific security measures (i.e., access, monitoring, reporting) 4. Access to system by vendor 5. Security questionnaire 6. Redundancy 7. Data Back-up 8. Disaster Recovery