Top Banner
Cloud Security Challenges Today and Tomorrow Name Title February 2011
23

Cloud Security Challenges Today and Tomorrow

Feb 25, 2016

Download

Documents

TAB

Cloud Security Challenges Today and Tomorrow. Name Title February 2011. Cloud: Dawn of a New Age. Cloud – overhyped in the short run, underestimated in the long term Compute becoming a utility Changes everything: business models, venture capital, R&D, ……. What is Cloud Computing?. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cloud Security Challenges Today and Tomorrow

Cloud Security Challenges Today and Tomorrow

NameTitle

February 2011

Page 2: Cloud Security Challenges Today and Tomorrow

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance

Cloud: Dawn of a New Age• Cloud – overhyped in the short run,

underestimated in the long term• Compute becoming a utility• Changes everything: business models, venture

capital, R&D, ……

Page 3: Cloud Security Challenges Today and Tomorrow

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance

What is Cloud Computing?• Compute as a utility: third major era of computing• Cloud enabled by

• Moore’s Law• Hyperconnectivity• SOA• Provider scale

• Key characteristics• Elastic & on-demand• Multi-tenancy• Metered service

Page 4: Cloud Security Challenges Today and Tomorrow

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance

4

2011-2014: the Hybrid Enterprise

enterprise boundary

public clouds

Extended Virtual Data Center

private clouds

cloud of users

Notional organizational

boundary

• Dispersal of applications• Dispersal of data• Dispersal of users• Dispersal of endpoint

devices

Page 5: Cloud Security Challenges Today and Tomorrow

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance

Cloud Forcing Key Issues• Critical mass of separation between data owners

and data processors• Anonymity of geography of data centers &

devices• Anonymity of provider• Transient provider relationships• Physical controls must be replaced by virtual

controls• Identity management has a key role to play• Cloud WILL drive change in the security status

quo• Reset button for security ecosystem

Page 6: Cloud Security Challenges Today and Tomorrow

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance

Key Cloud Security Problems of Today

From CSA Top Threats Research:• Trust: Lack of Provider transparency, impacts

Governance, Risk Management, Compliance • Data: Leakage, Loss or Storage in unfriendly geography• Insecure Cloud software• Malicious use of Cloud services• Account/Service Hijacking• Malicious Insiders• Cloud-specific attacks

Page 7: Cloud Security Challenges Today and Tomorrow

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance

Key Problems of Tomorrow

•Globally incompatible legislation and policy

•Non-standard Private & Public clouds•Lack of continuous Risk Mgt & Compliance monitoring

•Incomplete Identity Mgt implementations

•Haphazard response to security incidents

Page 8: Cloud Security Challenges Today and Tomorrow

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance

About the Cloud Security Alliance• Global, not-for-profit organization• Over 17,000 individual members, 90 corporate

members• Building best practices and a trusted cloud

ecosystem• Agile philosophy, rapid development of applied

research• GRC: Balance compliance with risk management• Reference models: build using existing standards• Identity: a key foundation of a functioning cloud

economy• Champion interoperability• Advocacy of prudent public policy

“To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud

Computing to help secure all other forms of computing.”

Page 9: Cloud Security Challenges Today and Tomorrow

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance

Helpful research from CSA

Page 10: Cloud Security Challenges Today and Tomorrow

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance

CSA Guidance Research

Guidance > 100k downloads: cloudsecurityalliance.org/guidance

Governance and Enterprise Risk Management

Legal and Electronic Discovery

Compliance and Audit

Information Lifecycle Management

Portability and Interoperability

Security, Bus. Cont,, and Disaster Recovery

Data Center Operations

Incident Response, Notification, Remediation

Application Security

Encryption and Key Management

Identity and Access Management

Virtualization

Cloud Architecture

Ope

ratin

g in

the

Clo

ud

Governing the

Cloud

• Popular best practices for securing cloud computing

• V2.1 released 12/2009

• V3 target Q3 2011• wiki.cloudsecurityallia

nce.org/guidance

Page 11: Cloud Security Challenges Today and Tomorrow

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance

Sample Guidance - Governance• Best opportunity to secure cloud engagement

is before procurement – contracts, SLAs, architecture

• Know provider’s third parties, BCM/DR, financial viability, employee vetting

• Identify data location when possible• Plan for provider termination & return of assets• Preserve right to audit where possible• Reinvest provider cost savings into due

diligence

Page 12: Cloud Security Challenges Today and Tomorrow

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance

Sample Guidance - Operating• Encrypt data when possible, segregate key

mgt from cloud provider• Adapt secure software development lifecycle• Understand provider’s patching, provisioning,

protection• Logging, data exfiltration, granular customer

segregation• Hardened VM images• Assess provider IdM integration, e.g. SAML,

OpenID

Page 13: Cloud Security Challenges Today and Tomorrow

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance

Cloud Controls Matrix Tool• Controls derived from

guidance• Rated as applicable to

S-P-I• Customer vs Provider

role• Mapped to ISO 27001,

COBIT, PCI, HIPAA• Help bridge the “cloud

gap” for IT & IT auditors

Page 14: Cloud Security Challenges Today and Tomorrow

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance

Consensus Assessment Initiative• Research tools and processes to perform

shared assessments of cloud providers• Lightweight “common criteria” concept• Integrated with Controls Matrix• Ver 1 CAI Questionnaire released Oct

2010, approx 140 provider questions to identify presence of security controls or practices – use to assess cloud providers today

Page 15: Cloud Security Challenges Today and Tomorrow

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance

CloudAudit• Open standard and API to automate

provider audit assertions• Change audit from data gathering to data

analysis • Necessary to provide audit & assurance at

the scale demanded by cloud providers• Uses Cloud Controls Matrix as controls

namespace • Use to instrument cloud for continuous

controls monitoring

Page 16: Cloud Security Challenges Today and Tomorrow

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance

CSA GRC Stack• Suite of tools, best practices and enabling technology

• Consolidate industry research & simplify GRC in the cloud

• For cloud providers, enterprises, solution providers and audit/compliance

• Controls Framework, Questionnaire and Continuous Controls Monitoring Automation

www.cloudsecurityalliance.org/grcstack Control Requirements

Provider Assertions

Private & Public Clouds

Page 17: Cloud Security Challenges Today and Tomorrow

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance

CCSK – Certificate of Cloud Security Knowledge• Only user certification for cloud

security• Web-based test for competency in

CSA guidance• $295 USD price• www.cloudsecurityalliance.org/certify

me

• Training courses under development

Page 18: Cloud Security Challenges Today and Tomorrow

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance

Trusted Cloud Initiative• Comprehensive Cloud Security Reference

Architecture• Secure & interoperable Identity in the cloud• Getting SaaS, PaaS to be “Relying Parties” for

corporate directories• Scalable federation• Outline responsibilities for Identity Providers• Assemble reference architectures with existing

standards• Identity Mgt best practices whitepaper:

http://www.cloudsecurityalliance.org/guidance/csaguide-dom12-v2.10.pdf

Page 19: Cloud Security Challenges Today and Tomorrow

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance

The need for the Security as a Service Initiative• Information assurance challenged by disruptive

trends (cloud, mobility, social networking, etc)• Cloud provides opportunity to rethink security

(economics, architecture, service delivery models, etc)

• Fulfill 2nd half of mission statement:“To promote the use of best practices for providing

security assurance within Cloud Computing, and provide education on the uses of Cloud

Computing to help secure all other forms of computing.”

Page 20: Cloud Security Challenges Today and Tomorrow

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance

Security as a Service Scope• Information Security Industry Re-invented• Define Security as a Service• Articulate solution categories within Security

as a Service• Guidance for adoption of Security as a Service• Align with other CSA research

• Develop deliverables as a proposed 14th domain within CSA Guidance version 3.

Page 21: Cloud Security Challenges Today and Tomorrow

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance

CloudSIRT• Consensus research for emergency

response in Cloud• Enhance community’s ability to

respond to incidents• Standardized processes• Supplemental best practices for SIRTs• Hosted Community of Cloud SIRTs• www.cloudsecurityalliance.org/cloudsirt.ht

ml

Page 22: Cloud Security Challenges Today and Tomorrow

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance

Contact

• Help us secure cloud computing• www.cloudsecurityalliance.org• [email protected]• LinkedIn:

www.linkedin.com/groups?gid=1864210• Twitter: @cloudsa

Page 23: Cloud Security Challenges Today and Tomorrow

www.cloudsecurityalliance.org

Thank you!