cloud security ciso club -april 2011 v2

22
Shahar Geiger Maor, Senior Analyst www.shaharmaor.blogspot.com http://www.facebook.com/shahar.maor http://twitter.com/shaharmaor Cloud Security: Risks and Awareness

Upload: shahar-geiger-maor

Post on 25-May-2015

870 views

Category:

Technology


2 download

DESCRIPTION

Cloud Security: risks and awareness. CISO club -April 2011

TRANSCRIPT

Page 1: Cloud Security CISO club -April 2011 v2

Shahar Geiger Maor, Senior Analyst

www.shaharmaor.blogspot.com http://www.facebook.com/shahar.maor http://twitter.com/shaharmaor

Cloud Security: Risks and Awareness

Page 2: Cloud Security CISO club -April 2011 v2

Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 2

We Should Know, by now, What Cloud

Means

http://www.opengroup.org/jericho/cloud_cube_model_v1.0.pdf

Page 3: Cloud Security CISO club -April 2011 v2

Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 3

Game Changer #7

Hybrid Clouds

Private Clouds

Public Clouds – BPaaS

– PaaS

– SaaS

– IaaS

Page 4: Cloud Security CISO club -April 2011 v2

Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 4

4 types: Enterprise Clouds

http://www.readwriteweb.com/cloud/2011/04/the-cloud-stratosphere-infogra.php

Page 5: Cloud Security CISO club -April 2011 v2

Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 5

Cloudy IT: the hybrid world

By 2014 : 80% of Israeli companies Will run hybrid clouds

Developers are now doing most of their development work for public cloud versions. But will have private cloud versions 2015

ISPs will become strategic

Page 6: Cloud Security CISO club -April 2011 v2

Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 6

How does a private “cloud” looks Like ?

Page 7: Cloud Security CISO club -April 2011 v2

Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 7

Enterprise Benefits from Cloud Computing

Server/Storage

Utilization 10-20%

Self service None

Test

Provisioning Weeks

Change

Management Months

Release

Management Weeks

Time to market bad

Metering/Billing Fixed cost

model

Focus on the

Core Not really

70-90%

Unlimited

Minutes

Days/Hours

Minutes

Better

Granular

Much better

Legacy environments Cloud enabled enterprise

Cloud accelerates

business value

across a wide

variety of

domains.

Capability From To

Source: IBM STKI modifications

Page 8: Cloud Security CISO club -April 2011 v2

Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 8

Technologies Categorization 2010\2011

Using Implementing Looking

Mar

ket

Cu

rio

sity

Market Maturity

Major

Changes

IT Project

Cyber Warfare

Size of figure =

complexity/

cost of project

Mobile Sec

DLP \IRM

“Social” Security

Cloud Security

Network Security

Application Security

Endpoint Security

Security

Management

Source: STKI

Page 9: Cloud Security CISO club -April 2011 v2

Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 9

Cloud Security

http://securosis.com/research

Page 10: Cloud Security CISO club -April 2011 v2

Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 10

Top Threats To Cloud Computing

http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf

Abuse and Nefarious Use of Cloud Computing

Malicious Insiders

Shared Technology

Issues

Insecure Interfaces and

APIs

Data Loss or Leakage

Account or Service Hijacking

Unknown Risk Profile

Page 11: Cloud Security CISO club -April 2011 v2

Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 11

Cloud Provider Vs. Organization

Governance Compliance Trust

Architecture

Identity and Access

Management

Software Isolation

Data Protection Availability Incident

Response

http://csrc.nist.gov/publications/drafts/800-144/Draft-SP-800-144_cloud-computing.pdf

Page 12: Cloud Security CISO club -April 2011 v2

Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 12

Division of Liabilities in the Cloud

http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-information-assurance-framework/

Page 13: Cloud Security CISO club -April 2011 v2

Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 13

How to Secure the Cloud? –Provider’s Side

http://www.ca.com/files/IndustryResearch/security-cloud-computing-users_235659.pdf

Technologies believed to be most important in securing the cloud computing environment

Page 14: Cloud Security CISO club -April 2011 v2

Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 14

Cloud Services Concerns –Client’s Side

Security (especially access issues) is still

considered a top concern

Source: InformationWeek, State of Cloud, Jan 2011

Page 15: Cloud Security CISO club -April 2011 v2

Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 15

Cloud Services Concerns –Client’s Side

Source: InformationWeek, State of Cloud, Jan 2011

“We won’t be involving our security team in this project until the last possible moment, because the answer will be ‘no.’” -VP at one of the largest retailers in the world

Page 16: Cloud Security CISO club -April 2011 v2

Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 16

Lack of Confidence in IT?

http://www.ca.com/files/IndustryResearch/security-cloud-computing-users_235659.pdf

Who is responsible for ensuring a secure cloud computing environment?

Isn't cloud security an IT responsibility??? -So why is it 3rd?

Don’t let it scatter

Page 17: Cloud Security CISO club -April 2011 v2

Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 17

Regulations, Standards and Certifications

Regulations?????

-Nothing (so far…)

Looking for regulations?

…Please wait for the next disaster

Page 18: Cloud Security CISO club -April 2011 v2

Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 18

Regulations, Standards and Certifications

• Standards: – AICPA: SAS 70:

• there is no published list of SAS 70 standards (Recommendation: ask to review your cloud provider’s SAS 70 type Ⅰ/Ⅱ report!!!)

• Certifications: – NIST (National Institute of Standards and Technology)

• Recommended Security Controls for Federal Information Systems and Organizations* === > FISMA (Federal Information Security Management Act) ATO (Authorization to Operate).

– CSA: • CCSK –Certified Cloud Security Knowledge

* Not related directly to cloud security

Page 19: Cloud Security CISO club -April 2011 v2

Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 19

Regulations, Standards and Certifications

• Guidelines:

– CSA (Cloud Security Alliance):

• CCM -Cloud Controls Matrix

– NIST (National Institute of Standards and Technology):

• DRAFT Guidelines on Security and Privacy in Public Cloud Computing

– ENISA (European Network and Information Security Agency):

• Cloud Security Information Assurance Framework

Page 20: Cloud Security CISO club -April 2011 v2

Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 20

Addressing Cloud Issues in the Israeli Government

?

http://www.justice.gov.il/NR/rdonlyres/1FB266DE-95A0-4C31-939B-3796DCB0C232/23065/positionmikurhuz.pdf

בישראל במיקור חוץ עקרונות להגנת הפרטיות במידע אישי : מתוך נייר עמדה בנושא 2010/10

Page 21: Cloud Security CISO club -April 2011 v2

Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 21

Look for standards

Find yourself a solid

partner

In Short

The cloud is here to stay

Security is an EASY

showstopper

…”We put our money in

the cloud” No rush!

Page 22: Cloud Security CISO club -April 2011 v2

Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 22

Thank you!