SlideShare a Scribd company logo
1 of 16
Encrypting your data: Is there
  a difference between Cloud
and your internal data centre?
          Vladimir Jirasek, Founder of Jirasek Consulting Services
            Research director, Cloud Security Alliance, UK chapter


                                                      16 January 2013
What you will learn today

 Security architecture prime for CIOs

 Encrypt, or not encrypt, that is the question!

 Alternatives to encryption

 Types of encryption

 Encryption as a security boundary

 Cloud delivery models and encryption

 Practical examples of encryption in Public
AES-128 so it must be secure! Trust me!



          PDF
         Secret
                                 01010001
                                 10101010
                                 10110101                   PDF
                                                           Secret
                                 01001010
                                 10101011
                                 00110101


                                                          Cloud service
Cloud service
                                                            provider
    user

                  Just because it is encrypted does not
                  make it secure… Look end to end.
However not all data in the cloud are
secret!
Sometimes too much encryption is bad
though.




       Who holds encryption keys? Are they available?
Should data security be on CIOs agendas?



    PaaS/Saas


                                                                          Mandatory reading!




                    Saas
                                         Saas


 Cloud provider        Your company             Consolidation of             Cost savings in
reputation/costs      reputation/costs          Cloud providers               Enterprises


      Not many security breaches                Will become targeted as more enterprises rely
            so far. Why?                               more on public Cloud computing
CIOs! Security architecture is not just
firewalls and encryption…

                        A clever, sophisticated and fit
                          for purpose combination of
                          administrative and technical
                          controls

                        Right mix of controls at all
                          security domains:
                          preventative, detective
                          (mostly neglected) and
                          recovery

                        Start with Processes then fit
                          People and Technology
Types of encryption and security
boundary

     Encryption types                         Security boundary
 Symmetric – one key to encrypt and        Encryption can be used as a
   decrypt. Speed and better security
                                              security boundary:
 Asymmetric – large prime numbers             Key management is an
   create a pair of keys where one key           enforcement point
   can decrypt what other encrypted.
   Slower as bigger keys are needed
   (look for ECC twice the length of        Think of SSL VPN over
   symmetric for same strength) (size of      untrusted network
   output based on size of keys)

 Homomorphic - not new concept but         Encrypted data in database
   made practical by Craig gentry.
   Allows for operations on encrypted
   data without revealing the content!      eDRM
Different ways to protect data in Cloud


               Encryption at Customer end
     PDF
    Secret
             Encryption at Cloud provider end

              Tokenisation at Cloud user end

             Anonymisation at Cloud user end
Cloud deployment models effect data
    security

    Infrastructure as a
                                     Platform as a Service            Software as a Service
          Service


•   Cloud provider offers        •    Cloud provider offers       •    Cloud provider offers
    virtual machine                   standardised (mostly)            mostly custom build
    (typically) – Virtual CPU,        platforms for database,          Software (typically web
    Memory, Disks,                    middleware, web …                based)
    Network                      •    Operating system is         •    Full OS stack is
•   Operating system is               Provider’s responsibility        Provider’s responsibility
    Customer’s                   •    Extending key               •    Extending key
    responsibility                    management from                  management to Cloud
•   Extending key                     Internal DC possible             provider from Internal
    management from                                                    DC difficult
    Internal DC easy
Data protection options in cloud models
                 Infrastructure as a
                                                      Platform as a Service             Software as a Service
                       Service
SIEM




                 Extend company SIEM                                  Plug-in to Provider’s SIEM

                  Extend DLP or eDRM                          Provider operated data/database encryption
Data




              Extend company file or object                                            Encrypting/tokenising reverse
                       encryption                                                      proxy engines (e.g. CipherCloud)
Application




                                                               Tokenisation and anonymisation
                 Application encryption (customer retains keys)
               Encryption appliance
Host




                  (e.g. Safe-Net ProtectV)
                                                      Provider dependent and operated host encryption

                                             Web TLS (for IaaS operated by customer)
Network




                        Network VPN (could extend to SaaS)
Example of SaaS – Use of Gmail inside
and outside an organisation

Intra company                             SaaS web based application.
                                             Other standard interfaces –
                                             IMAP, POP3, SMTP, Web API

 Sender                                   Data in Gmail available to
                                             anyone with proper
                                             authentication
                Proxy

Recipient                                 TLS used on transport layer

                                          Consider using CipherCloud
                                             like product but be mindful of
                                             traffic flows with external
                                             customers
                        Sender   Recipient
Example of IaaS – Cloud provider offers virtual
 computing resources for Internal apps deployment

Intra company                                                              Cloud provider can
                     Key management
                                                                             theoretically access all
                         HSM                                                 data, if decryption
                                                                             happens on the virtual
Internal                                                                     machine! But would they?
  user
                                                                           Use two possible models:
                       VPN
                                                                             Local crypto operations
                                                                               with remote key
Administrator
                                                                               management. Consider
                                                                               SafeNet ProtectV
                                                                             Remote crypto
                                                                               operations over VPN –
                                                                               speed penalty
                                 Data encrypted
                                                       Data encrypted
                                    Remote
                                                       Local encryption
                                   encryption
                                                         operations
   Travelling user                 operations
                                                  Virtual servers
Recommendations
 Devise your security architecture holistically, not just looking at
   point solutions

 But with regards to data security in the cloud:
   Always try to manage your keys – however in some cases this would
     break cloud deployment model and therefore is not always
     practical
    Use Hardware Security Modules to maintain key security supported
     by robust key management processes
    Extend your enterprise key management, DLP, eDRP and SIEM to
     Cloud providers
    Explore format preserving encryption before data enters Cloud –
     typically for PaaS and SaaS (reverse web encryption proxy)
Links
   Cloud Security Guidance - https://cloudsecurityalliance.org/research/security-guidance/

   Verizon Data Breach reports - http://www.verizonbusiness.com/about/events/2012dbir/

   Dropbox access breach - http://www.securityweek.com/dropbox-confirms-data-breach-says-two-factor-authentication-coming

   Microsoft BPOS Address book leakage -
    http://www.pcworld.com/article/214591/Microsoft_BPOS_cloud_service_hit_with_data_breach.html

   Epsilon data breach - http://www.guardian.co.uk/technology/2011/apr/06/epsilon-email-hack-marks-spencer

   Google email accounts hacked - http://www.washingtonpost.com/blogs/post-tech/post/google-hundreds-of-gmail-accounts-hacked-
    including-some-senior-us-government-officials/2011/06/01/AGgASgGH_blog.html

   CipherCloud lists data breaches in Cloud - http://www.ciphercloud.com/learning-center/breach-watch.aspx

   CloudTweaks.com – Cloud Cartoons - http://www.cloudtweaks.com/category/cartoon/

   Privatecore - http://www.privatecore.com/
Contact me and CSA

 Vladimir Jirasek
   http://about.me/jirasek
   @vjirasek
   vladimir@jirasekconsulting.com

 Cloud Security Alliance
   https://cloudsecurityalliance.org.uk
   @csaukresearch

More Related Content

More from Vladimir Jirasek

Security architecture for LSE 2009
Security architecture for LSE 2009Security architecture for LSE 2009
Security architecture for LSE 2009Vladimir Jirasek
 
Mobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risksMobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risksVladimir Jirasek
 
Information Risk Security model and metrics
Information Risk Security model and metricsInformation Risk Security model and metrics
Information Risk Security model and metricsVladimir Jirasek
 
Integrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processesIntegrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processesVladimir Jirasek
 
Securing mobile population for White Hats
Securing mobile population for White HatsSecuring mobile population for White Hats
Securing mobile population for White HatsVladimir Jirasek
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architectureVladimir Jirasek
 
Meaningfull security metrics
Meaningfull security metricsMeaningfull security metrics
Meaningfull security metricsVladimir Jirasek
 
CAMM presentation for Cyber Security Gas and Oil june 2011
CAMM presentation for Cyber Security Gas and Oil june 2011CAMM presentation for Cyber Security Gas and Oil june 2011
CAMM presentation for Cyber Security Gas and Oil june 2011Vladimir Jirasek
 
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir JirasekISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir JirasekVladimir Jirasek
 
Federation For The Cloud Opportunities For A Single Identity
Federation For The Cloud  Opportunities For A Single IdentityFederation For The Cloud  Opportunities For A Single Identity
Federation For The Cloud Opportunities For A Single IdentityVladimir Jirasek
 

More from Vladimir Jirasek (11)

Security architecture for LSE 2009
Security architecture for LSE 2009Security architecture for LSE 2009
Security architecture for LSE 2009
 
Mobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risksMobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risks
 
Information Risk Security model and metrics
Information Risk Security model and metricsInformation Risk Security model and metrics
Information Risk Security model and metrics
 
Integrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processesIntegrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processes
 
Securing mobile population for White Hats
Securing mobile population for White HatsSecuring mobile population for White Hats
Securing mobile population for White Hats
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architecture
 
Meaningfull security metrics
Meaningfull security metricsMeaningfull security metrics
Meaningfull security metrics
 
CAMM presentation for Cyber Security Gas and Oil june 2011
CAMM presentation for Cyber Security Gas and Oil june 2011CAMM presentation for Cyber Security Gas and Oil june 2011
CAMM presentation for Cyber Security Gas and Oil june 2011
 
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir JirasekISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
 
Qualys Webex 24 June 2008
Qualys Webex 24 June 2008Qualys Webex 24 June 2008
Qualys Webex 24 June 2008
 
Federation For The Cloud Opportunities For A Single Identity
Federation For The Cloud  Opportunities For A Single IdentityFederation For The Cloud  Opportunities For A Single Identity
Federation For The Cloud Opportunities For A Single Identity
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Encryption in the Cloud - BrightTalk Data Security Summit 2013

  • 1. Encrypting your data: Is there a difference between Cloud and your internal data centre? Vladimir Jirasek, Founder of Jirasek Consulting Services Research director, Cloud Security Alliance, UK chapter 16 January 2013
  • 2. What you will learn today  Security architecture prime for CIOs  Encrypt, or not encrypt, that is the question!  Alternatives to encryption  Types of encryption  Encryption as a security boundary  Cloud delivery models and encryption  Practical examples of encryption in Public
  • 3. AES-128 so it must be secure! Trust me! PDF Secret 01010001 10101010 10110101 PDF Secret 01001010 10101011 00110101 Cloud service Cloud service provider user Just because it is encrypted does not make it secure… Look end to end.
  • 4. However not all data in the cloud are secret!
  • 5. Sometimes too much encryption is bad though. Who holds encryption keys? Are they available?
  • 6. Should data security be on CIOs agendas? PaaS/Saas Mandatory reading! Saas Saas Cloud provider Your company Consolidation of Cost savings in reputation/costs reputation/costs Cloud providers Enterprises Not many security breaches Will become targeted as more enterprises rely so far. Why? more on public Cloud computing
  • 7. CIOs! Security architecture is not just firewalls and encryption…  A clever, sophisticated and fit for purpose combination of administrative and technical controls  Right mix of controls at all security domains: preventative, detective (mostly neglected) and recovery  Start with Processes then fit People and Technology
  • 8. Types of encryption and security boundary Encryption types Security boundary  Symmetric – one key to encrypt and  Encryption can be used as a decrypt. Speed and better security security boundary:  Asymmetric – large prime numbers  Key management is an create a pair of keys where one key enforcement point can decrypt what other encrypted. Slower as bigger keys are needed (look for ECC twice the length of  Think of SSL VPN over symmetric for same strength) (size of untrusted network output based on size of keys)  Homomorphic - not new concept but  Encrypted data in database made practical by Craig gentry. Allows for operations on encrypted data without revealing the content!  eDRM
  • 9. Different ways to protect data in Cloud Encryption at Customer end PDF Secret Encryption at Cloud provider end Tokenisation at Cloud user end Anonymisation at Cloud user end
  • 10. Cloud deployment models effect data security Infrastructure as a Platform as a Service Software as a Service Service • Cloud provider offers • Cloud provider offers • Cloud provider offers virtual machine standardised (mostly) mostly custom build (typically) – Virtual CPU, platforms for database, Software (typically web Memory, Disks, middleware, web … based) Network • Operating system is • Full OS stack is • Operating system is Provider’s responsibility Provider’s responsibility Customer’s • Extending key • Extending key responsibility management from management to Cloud • Extending key Internal DC possible provider from Internal management from DC difficult Internal DC easy
  • 11. Data protection options in cloud models Infrastructure as a Platform as a Service Software as a Service Service SIEM Extend company SIEM Plug-in to Provider’s SIEM Extend DLP or eDRM Provider operated data/database encryption Data Extend company file or object Encrypting/tokenising reverse encryption proxy engines (e.g. CipherCloud) Application Tokenisation and anonymisation Application encryption (customer retains keys) Encryption appliance Host (e.g. Safe-Net ProtectV) Provider dependent and operated host encryption Web TLS (for IaaS operated by customer) Network Network VPN (could extend to SaaS)
  • 12. Example of SaaS – Use of Gmail inside and outside an organisation Intra company  SaaS web based application. Other standard interfaces – IMAP, POP3, SMTP, Web API Sender  Data in Gmail available to anyone with proper authentication Proxy Recipient  TLS used on transport layer  Consider using CipherCloud like product but be mindful of traffic flows with external customers Sender Recipient
  • 13. Example of IaaS – Cloud provider offers virtual computing resources for Internal apps deployment Intra company  Cloud provider can Key management theoretically access all HSM data, if decryption happens on the virtual Internal machine! But would they? user  Use two possible models: VPN  Local crypto operations with remote key Administrator management. Consider SafeNet ProtectV  Remote crypto operations over VPN – speed penalty Data encrypted Data encrypted Remote Local encryption encryption operations Travelling user operations Virtual servers
  • 14. Recommendations  Devise your security architecture holistically, not just looking at point solutions  But with regards to data security in the cloud:  Always try to manage your keys – however in some cases this would break cloud deployment model and therefore is not always practical  Use Hardware Security Modules to maintain key security supported by robust key management processes  Extend your enterprise key management, DLP, eDRP and SIEM to Cloud providers  Explore format preserving encryption before data enters Cloud – typically for PaaS and SaaS (reverse web encryption proxy)
  • 15. Links  Cloud Security Guidance - https://cloudsecurityalliance.org/research/security-guidance/  Verizon Data Breach reports - http://www.verizonbusiness.com/about/events/2012dbir/  Dropbox access breach - http://www.securityweek.com/dropbox-confirms-data-breach-says-two-factor-authentication-coming  Microsoft BPOS Address book leakage - http://www.pcworld.com/article/214591/Microsoft_BPOS_cloud_service_hit_with_data_breach.html  Epsilon data breach - http://www.guardian.co.uk/technology/2011/apr/06/epsilon-email-hack-marks-spencer  Google email accounts hacked - http://www.washingtonpost.com/blogs/post-tech/post/google-hundreds-of-gmail-accounts-hacked- including-some-senior-us-government-officials/2011/06/01/AGgASgGH_blog.html  CipherCloud lists data breaches in Cloud - http://www.ciphercloud.com/learning-center/breach-watch.aspx  CloudTweaks.com – Cloud Cartoons - http://www.cloudtweaks.com/category/cartoon/  Privatecore - http://www.privatecore.com/
  • 16. Contact me and CSA  Vladimir Jirasek  http://about.me/jirasek  @vjirasek  vladimir@jirasekconsulting.com  Cloud Security Alliance  https://cloudsecurityalliance.org.uk  @csaukresearch

Editor's Notes

  1. Working on a project – project managers says we have a VPN tunnel for data transfer so that is enough for security 
  2. Talk about data classification. We will talk about dropbox later
  3. Apply encryption only where needed and make sure that the key management is done properly. NIST document http://csrc.nist.gov/groups/ST/toolkit/key_management.html
  4. Look at processes required by ISO, Cobit..Control objective = process (typically)
  5. Also talk about extending DLP and eDRM