Cloud Security Alliance Research & Roadmap June 2012

Slides:



Advertisements
Similar presentations
1Copyright © 2010, Printer Working Group. All rights reserved. PWG Plenary TCG Activity Summary 7 April 2010 Camas, WA – PWG F2F Meeting Ira McDonald (High.
Advertisements

Copyright © 2011 Cloud Security Alliance DANIELE CATTEDDU CSA Managing Director EMEA.
Copyright © 2011 Cloud Security Alliance Achieving Security Assurance and Compliance in the Cloud Jim Reavis, Executive Director.
© 2007 IBM Corporation Enterprise Content Management Integrating Content, Process, and Connectivity for Competitive Advantage Malcolm Holden October 2007.
Course: e-Governance Project Lifecycle Day 1
The Internet2 NET+ Services Program Jerry Grochow Interim Vice President CSG January, 2012.
Copyright © 2011 Cloud Security Alliance Trusted Cloud Initiative Work Group Session.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Copyright © 2013 Cloud Security Alliance.
Strategy 2022: A Holistic View Tony Hayes International President ISACA © 2012, ISACA. All rights reserved.
Cloud Security Challenges Today and Tomorrow NameTitle February 2011.
Copyright © 2011 Cloud Security Alliance Keynote.
Copyright © 2012 Cloud Security Alliance Conference Announcements.
Collaboration Oriented Architecture COA Position Paper An Overview Adrian Seccombe Board of Management, Jericho Forum ® CISO & Snr Enterprise Information.
Copyright © 2012 Cloud Security Alliance – UK & Ireland Liberty Hall, Dublin March 30th 2012.
Security Controls – What Works
CloudAudit Working Group Update April CloudAudit Charter Provide a common interface and namespace that allows cloud computing providers to automate.
Achieving Security Assurance and Compliance in the Cloud Jim Reavis Executive Director.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Cloud Security Challenges Today and Tomorrow Aloysius Cheang Asia Pacific Strategy Advisor April 2011.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
The Evergreen, Background, Methodology and IT Service Management Model
Cloud Security Alliance Research & Roadmap Jim Reavis Executive Director August 2011.
© Cloud Security Alliance, 2015 Sean Cordero, Chair CCM Laura Posey, Chair CAIQ.
THE REGIONAL MUNICIPALITY OF YORK Information Technology Strategy & 5 Year Plan.
SECURITY Is cloud computing secure? Are Microsoft Online Services secure? Is cloud computing secure? Are Microsoft Online Services secure? PRIVACY What.
Demystifying the Business Analysis Body of Knowledge Central Iowa IIBA Chapter December 7, 2005.
Computer Science and Engineering 1 Cloud ComputingSecurity.
Risk Management & Legal Issues in Cloud Practice Christopher Dodorico Director, PricewaterhouseCoopers Wednesday, October 10, 2012.
Achieving Security Assurance and Compliance in the Cloud Jim Reavis Executive Director.
Cloud Security Alliance Research & Roadmap
Cloud Security Alliance Overview and Organizational Plans Jim Reavis, Co-founder & Executive Director August 5, 2009.
European Broadband Portal Phase II Application of the Blueprint for “bottom-up” broadband initiatives.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
Copyright © 2004 by The Web Services Interoperability Organization (WS-I). All Rights Reserved 1 Interoperability: Ensuring the Success of Web Services.
CERTIFICATION In the Electronics Recycling Industry © 2007 IAER Web Site - -
Copyright © 2011 Cloud Security Alliance Building Trust into the Next Generation of Information Technology.
Geneva, Switzerland, April 2012 Introduction to session 7 - “Advancing e-health standards: Roles and responsibilities of stakeholders” ​ Marco Carugi.
Copyright © 2011 Cloud Security Alliance Cloud Security Alliance Research & Roadmap Jim Reavis, Executive Director, CSA.
© Cloud Security Alliance, 2015 Evelyn de Souza Chair Cloud Security Alliance Data Governance Chair/ Data Privacy and Compliance Leader Cisco Systems.
Cloud Security: Critical Threats and Global Initiatives Jim Reavis, Executive Director July, 2010.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
The Value Driven Approach
Robert Mahowald August 26, 2015 VP, Cloud Software, IDC
Discussion - HITSC / HITPC Joint Meeting Transport & Security Standards Workgroup October 22, 2014.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© Cloud Security Alliance, 2015 Sean Cordero, Chair CCM.
Built on the Powerful Microsoft Azure Platform, Forensic Advantage Helps Public Safety and National Security Agencies Collect, Analyze, Report, and Distribute.
1 COSO ERM Framework Update Our Next Challenge and Opportunity September 2015.
© Cloud Security Alliance, 2015 Sean Cordero, Chair CCM.
© Cloud Security Alliance, 2015 March 2, Agenda © Cloud Security Alliance, 2015 The SecaaS Working Group Recent Activity Charter Category outline/templates.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
CMMI Certification - By Global Certification Consultancy.
International Planetary Data Alliance Registry Project Update September 16, 2011.
Update from the Faster Payments Task Force
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Dimitra Liveri | NIS Expert CSA CEE Summit 2017|Ljubljana - 9 March
Integrated Management System and Certification
SMS+ on Microsoft Azure Provides Enhanced and Secure Text Messaging, with Audit Trail, Scalability, End-to-End Encryption, and Special Certifications MICROSOFT.
Why Accessibility Profession Matters IAAP UK Chapter
Standardization in Automotive Infotainment with GENIVI and CCC
Alignment of COBIT to Botswana IT Audit Methodology
Achieving Security Assurance and Compliance in the Cloud
Collaboration Oriented Architecture COA Position Paper An Overview
Draft Charter Community of Practice for Direct Access Entities
Presentation transcript:

Cloud Security Alliance Research & Roadmap June 2012 Presenter Name

About the Cloud Security Alliance Global, not-for-profit organization Over 35,678 individual members, 123 corporate members, 20 affiliate members, 64 chapters worldwide Building best practices and a trusted cloud ecosystem Agile philosophy, rapid development of applied research GRC: Balance compliance with risk management Reference models: build using existing standards Identity: a key foundation of a functioning cloud economy Champion interoperability Enable innovation Advocacy of prudent public policy “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.” 2

About the Cloud Security Alliance Developed first comprehensive best practices for secure cloud computing, Security Guidance for Critical Areas of Focus for Cloud Computing (updated October 2011) First and only user certification for cloud security, the CCSK (Certificate of Cloud Security Knowledge, September 2010) Tools for managing Governance, Risk and Compliance in the Cloud Registry of cloud provider security practices, the CSA STAR (Security, Trust & Assurance Registry, Q4 2011) Industry leading security practices, education and tools developed by 30+ working groups Selection of CSA venue by US White House to announce the US Federal Cloud Strategy in 2011 Leadership in developing new security standards addressing cloud computing Trusted advisor to governments and Global 2000 firms around the world “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.” 3

RESEARCH http://cloudsecurityalliance.org/research/ 4

Global Research Footprint Global resource and research coverage through our corporate membership, affiliate members, chapters and Connected to great minds: Research contributors represent some of the top minds in information security and cloud computing Copyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.org www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance

CSA Guidance V3 Popular best practices for securing cloud computing Flagship research project V 3.0 Released (November 2011) In alignment with international standards The CSA Guidance is our flagship research that provides a broad catalog of best practices. It contains 13 domains to address both broad governance and specific operational issues. This Guidance is used as a foundation for the other research projects in the following slides that relate to compliance. > 100k downloads: cloudsecurityalliance.org/guidance 6

Private, Community & Public Clouds CSA GRC Stack Family of 4 research projects Cloud Controls Matrix Consensus Assessments Initiative Cloud Audit Cloud Trust Protocol Tools for governance, risk and compliance management Control Requirements Provider Assertions Private, Community & Public Clouds

Cloud Controls Matrix Tool Controls derived from guidance Mapped to familiar frameworks: ISO 27001, COBIT, PCI, HIPAA, FISMA, FedRAMP, etc. Rated as applicable to S-P-I Customer vs. Provider role Help bridge the “cloud gap” for IT & IT auditors

Consensus Assessment Initiative Research tools and processes to perform shared assessments of cloud providers Integrated with Controls Matrix Version 1 CAI Questionnaire released Oct 2010, approximately 140 provider questions to identify presence of security controls or practices Use to assess cloud providers today, procurement negotiation, contract inclusion, quantify SLAs

CloudAudit Open standard and API to automate provider audit assertions Change audit from data gathering to data analysis Necessary to provide audit & assurance at the scale demanded by cloud providers Uses Cloud Controls Matrix as controls namespace Use to instrument cloud for continuous controls monitoring

Cloud Trust Protocol (CTP) Developed by CSC, transferred to CSA Open standard and API to verify control assertions “Question and Answer” asynchronous protocol, leverages SCAP (Secure Content Automation Protocol) Integrates with Cloud Audit Now we have all the components for continuous controls monitoring

CSA STAR Registry CSA STAR (Security, Trust and Assurance Registry) Public Registry of Cloud Provider self assessments Based on Consensus Assessments Initiative Questionnaire Provider may substitute documented Cloud Controls Matrix compliance Voluntary industry action promoting transparency Free market competition to provide quality assessments Provider may elect to provide assessments from third parties Available October 2011

Trusted Cloud Initiative To Promote Education, Research and Certification of Secure and Interoperable Identity Comprehensive Cloud Security Reference Architecture Assemble reference architectures with existing standards www.cloudsecurityalliance.org/trustedcloud.html

TCI Reference Model Structure – 7 Domains TCI Reference Architecture

Security as a Service Information Security Industry Re-invented Define Security as a Service (SecaaS) Identify Ten Categories within SecaaS Develop Domain 14 within CSA Guidance V3 Implementation Guidance for each SecaaS Category Align with international standards and other CSA research www.cloudsecurityalliance.org/secaas.html 15

Data Governance Project To identify the current state of public cloud provider maturity identified in CSA Guidance research Cloud Data Governance Maturity Survey of current Cloud Provider practices in the market (e.g. backup, encryption, secure deletion, etc.) Structure based on Domain 5: Information Lifecycle Management Re-define Data Life Cycle Model Identify Key Concerns for Stakeholders Data Governance in Emerging Technologies in the Cloud 16

CloudCERT Consensus research for emergency response in Cloud Enhance community’s ability to respond to incidents Standardized processes Supplemental best practices for CERTs Hosted Community of Cloud CERTs Being spun out into a separate, related entity www.cloudsecurityalliance.org/cloudsirt.html

Telecom Working Group Industry a key stakeholder in future of cloud CSA’s liaison to ITU-T 5 Telecom Initiatives Telecom and the GRC Stack ISO 27017 Interviews to CSP’s SIEM Compliance Monitoring Cloud Forensics and Legal https://cloudsecurityalliance.org/research/telecom/

Top Threats Provide needed context to assist organizations in making educated risk management decisions regarding their cloud adoption strategies V.2 of Top Threats Report released in July 2012 “Top Threats” document will be updated regularly to reflect expert consensus on the probable threats which customers should be concerned about. https://cloudsecurityalliance.org/research/to p-threats

Mobile Securing application stores and other public entities deploying software to mobile devices Analysis of mobile security capabilities and features of key mobile operating systems Cloud-based management, provisioning, policy, and data management of mobile devices to achieve security objectives Guidelines for the mobile device security framework and mobile cloud architectures Solutions for resolving multiple usage roles related to BYOD, e.g. personal and business use of a common device

Mobile (Part 2) Scalable authentication from mobile devices to multiple, heterogeneous cloud providers Best practices for secure mobile application development Identification of primary risks related to individually owned devices accessing organizational systems (commonly known as BYOD – Bring Your Own Device) https://cloudsecurityalliance.org/research/mobile

Big Data Identifying scalable techniques for data-centric security and privacy problems Lead to crystallization of best practices for security and privacy in big data Help industry and government on adoption of best practices Establish liaisons with other organizations in order to coordinate the development of big data security and privacy standards Accelerate the adoption of novel research aimed to address security and privacy issues https://cloudsecurityalliance.org/research/big-data

HIM Working Group Provide direct influence on how health information service providers deliver secure cloud solutions (services, transport, applications and storage) to their clients, and foster cloud awareness within all aspects of healthcare and related industries 2 Health Initiatives HIPAA and HiTech Best Practices Healthcare Recommendations Guidance to V.3 https://cloudsecurityalliance.org/research/him/

CSA and ISACA Joint Cloud Maturity Project The Cloud Security Alliance (CSA) and ISACA announced the availability of a new survey on cloud market maturity, part of the first collaborative project between the two organizations The survey will be open to the public through June 1, and can be found here: https://www.surveymonkey.com/s/Clou dMarketSurvey 24

CSA Basecamp The CSA Projects will begin migrating to the "new" Basecamp found at the following URL: https://launchpad.37signals.com/  This site will give you access to all of your CSA projects on the new Basecamp and the pre-existing projects found in the renamed "Basecamp Classic".  The 37Signals Launchpad will help you navigate to both Basecamp sites if you are participating in multiple CSA Working Groups.

How do you get involved? Learn how you can participate in Cloud Security Alliance's goals to promote the use of best practices for providing security assurance within Cloud Computing http://www.linkedin.com/groups?gid=1864210 https://cloudsecurityalliance.org/get-involved/

Submit Your Research Ideas New Research Ideas Submit Your Research Ideas Do you have an idea for a research project on a cloud security topic? If so, please take the time to describe your concept. Ideas are monitored by the CSA research team, who will review your proposal and respond to you with feedback. https://cloudsecurityalliance.org/research/, the Submit Ideas tab

Contribute to the CSA library The Cloud Security Alliance is a community non-profit which is driven by its members. Have a white paper or information on a cloud security product you want to contribute? https://cloudsecurityalliance.org/education/white-papers-and- educational-material/

GLOBAL CHAPTERS http://cloudsecurityalliance.org/chapters/ 29

Chapters Around the World 50 chapters and growing Every continent except Antarctica Translating guidance Adapting research to local needs Creating their own research projects 30

TRAINING & CERTIFICATION http://cloudsecurityalliance.org/education/ 31

Certificate of Cloud Security Knowledge (CCSK) Benchmark of cloud security competency Measures mastery of CSA guidance and ENISA cloud risks whitepaper Understand cloud issues Look for the CCSKs at cloud providers, consulting partners Online web-based examination www.cloudsecurityalliance.org/certifyme

Training Courses CCSK Basic CCSK Plus GRC Stack Training One day course to enable student to pass CCSK CCSK Plus Two day course includes practical cloud lab work GRC Stack Training One day course to use GRC Stack components PCI/DSS In the Cloud Achieving PCI compliance in cloud computing http://cloudsecurityalliance.org/education/training/

CONFERENCES & EVENTS http://cloudsecurityalliance.org/events/ 34

CSA Events Re-visit the SecureCloud 2012 Presentations from select speakers will be available soon at: https://cloudsecurityalliance.org/events/securecloud-2012/

CSA Events Re-visit the inaugural CSA “Building Trust in Cloud Computing” Summit 2012 hosted by the CSA Hong Kong & Macau Chapter held on May 17, 2012 at Hong Kong’s Cyberport. http://www.isoc.hk/2012/04/building-trust-in-cloud-computing-summit-2012.html

CSA Events September 25-26, 2012 Amsterdam, Netherlands For more information visit: http://www.cloudsecuritycongress.com/

CSA Events CSA Congress USA Workshops November 7,8, 9 Venue: Hilton Disney World Resort To register and for more information visit: https://misti.com/cloud

Contact Help Us Secure Cloud Computing www.cloudsecurityalliance.org info@cloudsecurityalliance.org LinkedIn: www.linkedin.com/groups?gid=1864210 Twitter: @cloudsa Do visit the website Do join the LinkedIn Groups – you will receive regular email updates 39

THANK YOU