R ISK M ANAGEMENT AND C LOUD S ECURITY Rodney A. Walsh, CGEIT, CRISC//Director of IT Risk Services Paco Diaz//Senior Consultant II CACUBO Central Association.

Slides:



Advertisements
Similar presentations
Pros and Cons of Cloud Computing Professor Kam-Fai Wong Faculty of Engineering The Chinese University of Hong Kong.
Advertisements

Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Clouds C. Vuerli Contributed by Zsolt Nemeth. As it started.
Cloud Usability Framework
Wally Kowal, President and Founder Canadian Cloud Computing Inc.
Be Smart, Use PwrSmart What Is The Cloud?. Where Did The Cloud Come From? We get the term “Cloud” from the early days of the internet where we drew a.
Cloud Computing Guide & Handbook SAI USA Madhav Panwar.
SPRING 2011 CLOUD COMPUTING Cloud Computing San José State University Computer Architecture (CS 147) Professor Sin-Min Lee Presentation by Vladimir Serdyukov.
Design of New or Changed Services in the Cloud: An ISO/IEC Perspective Ronald Dattero Missouri State University, CIS Dept. Stuart D. Galup Florida.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
EA and IT Infrastructure - 1© Minder Chen, Stages in IT Infrastructure Evolution Mainframe/Mini Computers Personal Computer Client/Sever Computing.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Discussion on LI for Mobile Clouds
Plan Introduction What is Cloud Computing?
Cloud Computing in Large Scale Projects George Bourmas Sales Consulting Manager Database & Options.
Effectively and Securely Using the Cloud Computing Paradigm.
Cloud Computing. 2 A division of Konica Minolta Business Solutions USA Inc. What is Cloud Computing? A model for enabling convenient, on-demand network.
Clouds on IT horizon Faculty of Maritime Studies University of Rijeka Sanja Mohorovičić INFuture 2009, Zagreb, 5 November 2009.
CLOUD COMPUTING & COST MANAGEMENT S. Gurubalasubramaniyan, MSc IT, MTech Presented by.
Introduction to Cloud Computing
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Presentation to the Housing Technology Conference Tim Cowland- Senior Consultant 27 th February 2014 The Rise of the Housing Cloud.
Jordan Wissel Eric Lewis Sarah Basile. Introduction This presentation will analyze: Overview/History Implementation Advantages/Disadvantages Security.
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 9. Preventing and Responding to Computer Fraud IT Security Ranked #2 Preventing and Responding.
Jim Reavis, Executive Director Cloud Security Alliance November 22, 2010 Developing a Baseline On Cloud Security.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Computer Science and Engineering 1 Cloud ComputingSecurity.
The Legal Issues Facing Digital Forensic Investigations In A Cloud Environment Presented by Janice Rafraf 15/05/2015Janice Rafraf1.
InfoSecurity Conference 2011 The Challenges of Cloud Computing John R. Robles John R. Robles and Associates
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Private Cloud: Manage Data Center Services Business Priorities Presentation.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
By Nicole Rowland. What is Cloud Computing?  Cloud computing means that infrastructure, applications, and business processes can be delivered to you.
Federal Trade Commission U.S. Rules on Privacy and Data Security Organization for International Investment General Counsel Conference October 16, 2009.
Cloud Computing. Definition  The Cloud is a metaphor for the Internet  Cloud computing is a model for enabling ubiquitous, convenient, on-demand network.
PaaSport Introduction on Cloud Computing PaaSport training material.
Cloud computing Cloud Computing1. NIST: Five essential characteristics On-demand self-service Computing capabilities, disks are demanded over the network.
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
CISC 849 : Applications in Fintech Namami Shukla Dept of Computer & Information Sciences University of Delaware A Cloud Computing Methodology Study of.
Bay Ridge Security Consulting (BRSC) Cloud Computing.
ISA 201 Intermediate Information Systems Acquisition.
CLOUD-BASED VIDS A CIO’S PERSPECTIVE Stephen Alford, CIO WEP, Inc.
Innovative Partnership Solution-Driven Commitment Agile Value Sustainable.
Software as a Service (SaaS) Fredrick Dande, MBA, PMP.
Template V.17, July 29, 2011 What’s the Cloud Got to do with HR Transformation? Heath Brownsworth, Director Technology Strategy.
Service Organization Control Reports What Have We Learned? Chris Bruhn DIRECTOR, IT RISK SERVICES, BKD, LLP SAS 70 ENDS EXIT TO SSAE 16.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
INTRODUCTION TO CLOUD COMPUTING. CLOUD  The expression cloud is commonly used in science to describe a large agglomeration of objects that visually appear.
Welcome To We have registered over 5,000 domain names and host over 1,500 cloud servers for individuals and organizations, Our fast and reliable.
Advanced cloud infrastructures and services SAULIUS ŽIŪKAS.
Private KEEP OFF! Private KEEP OFF! Open! What is a cloud? Cloud computing is a model for enabling convenient, on-demand network access to a shared.
Corporate Concerns on Cloud Services Environment กษิภัท ธนิตธนาคุณ คอลัมนิสต์ “IT Auditing” นิตยสาร ELEADER กรรมการผู้จัดการ บริษัท เคที ไอที โซลูชั่น.
The National Institute of Standards and Technology (NIST) define Cloud Computing as “a model for enabling convenient, on-demand network access to a shared.
Dr. Ir. Yeffry Handoko Putra
VIRTUALIZATION & CLOUD COMPUTING
Service Organization Control (SOC)
Cloud Computing Kelley Raines.
Chapter 21: Cloud Computing and Related Security Issues
Chapter 22: Cloud Computing Technology and Security
CNIT131 Internet Basics & Beginning HTML
Developing a Baseline On Cloud Security Jim Reavis, Executive Director
CACUBO Risk Management and Cloud Security
What is Interesting in the CCSP certification?
Cloud Computing: Concepts
Computer Science and Engineering
Basics of Cloud Computing
IT Management Services Infrastructure Services
Presentation transcript:

R ISK M ANAGEMENT AND C LOUD S ECURITY Rodney A. Walsh, CGEIT, CRISC//Director of IT Risk Services Paco Diaz//Senior Consultant II CACUBO Central Association of College & University Business Officers Kansas City Winter Workshop April 8, 2014

Risk Management & Cloud Security February 19, Define the cloud ecosystem Business use of cloud services Cloud service risks Governance of the cloud – critical policies, procedures & controls Third-party management considerations for the cloud Agenda

Risk Management & Cloud Security February 19, DEFINE THE CLOUD ECOSYSTEM

Risk Management & Cloud Security February 19, Define the Cloud Ecosystem Cloud Computing: Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models. Source: NIST Special Publication The NIST Definition of Cloud Computing ( )

Risk Management & Cloud Security February 19, Define the Cloud Ecosystem Cloud Computing: Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models. Source: NIST Special Publication The NIST Definition of Cloud Computing ( )

Risk Management & Cloud Security February 19, Define the Cloud Ecosystem Essential Characteristics  On demand self service  Broad network access  Resource pooling  Rapid elasticity  Measured service

Risk Management & Cloud Security February 19, Define the Cloud Ecosystem Service Models  Software as a Service (SaaS)  Platform as a Service (PaaS)  Infrastructure as a Service (IaaS)

Risk Management & Cloud Security February 19, SaaS Software as a Service PaaS Platform as a Service IaaS Infrastructure as a Service Define the Cloud Ecosystem Apps for Business Adobe Creative Cloud

Risk Management & Cloud Security February 19, Define the Cloud Ecosystem Deployment Models  Private cloud  Community cloud  Public cloud  Hybrid cloud

Risk Management & Cloud Security February 19, Define the Cloud Ecosystem Private Cloud  Provisioned for single organization  May exist on or off site  May be managed by organization or outsourced

Risk Management & Cloud Security February 19, Define the Cloud Ecosystem Community Cloud  Provisioned for exclusive use by a specific community  May be managed by one or more of the community organizations  May be managed by community organization or outsourced

Risk Management & Cloud Security February 19, Define the Cloud Ecosystem Public Cloud  Provisioned for general public  Exists on the premise of the cloud provider  May be owned, managed & operated by a business, academic or government organization or a combination

Risk Management & Cloud Security February 19, Define the Cloud Ecosystem Hybrid Cloud  Combination of two or more distinct cloud infrastructures  Combines characteristics of private, public & community clouds

Risk Management & Cloud Security February 19, Just Imagine 2011 Digital Universe Study: Extracting Value from Chaos It will take over 132 billion 64GB iPads to hold all of the world’s electronic data by 2015? Placing that many 64GB iPads end-to-end, it would go around the world over 790 times. You could create two stacks of that many 64GB iPads that would reach the moon and a 3 rd stack that would be 129,606 miles high. That many 64GB iPads would cost $92.76 trillion dollars.

Risk Management & Cloud Security February 19, BUSINESS USE OF CLOUD SERVICES

Risk Management & Cloud Security February 19, Business Use of Cloud Services “By 2016, the average personal cloud will synchronize and orchestrate at least six different device types. Gartner Predicts 2013: Cloud Computing Becomes an Integral Part of IT. Issue #3– Developing a campus-wide cloud strategy. EDUCAUSE “Top 10 IT Issues”, 2013

Risk Management & Cloud Security February 19, Financial Savings  Equipment  Personnel  Infrastructure  Space & utilities  Reduced obsolescence  Reduced capital expenditures  Reduced implementation costs Business Use of Cloud Services

Risk Management & Cloud Security February 19, Increased Flexibility  Rapid deployment  Ability to add or reduce capacity  On-demand provisioning  Disaster recovery  Business expansion (across town or across the globe) Business Use of Cloud Services

Risk Management & Cloud Security February 19, Streamlined business development  Focus on innovation & research  Reduced effort on management, maintenance & support  Simplified entry into or exiting from business initiatives  Increased access to technical expertise Business Use of Cloud Services

Risk Management & Cloud Security February 19, “Slow transition to the Clouds continues.” Kenneth C. Green- Campus Computing Project, EDUCAUSE Annual Conference 10/17/2013. Business Use of Cloud Services

Risk Management & Cloud Security February 19, Slow transition to the Clouds continues. Kenneth C. Green- Campus Computing Project, EDUCAUSE Annual Conference 10/17/2013. Why so slow?  Absence of provider offerings.  Can’t visualize moving to the Cloud.  Want to retain command, control & computing.  Let others make the journey first. Business Use of Cloud Services

Risk Management & Cloud Security February 19, CLOUD SERVICE RISKS

Risk Management & Cloud Security February 19, Cloud Service Risks

Risk Management & Cloud Security February 19, Cloud Service Risks Security  Physical access to infrastructure, systems & data  Physical location of systems, data  Logical access to the network, OS, applications & databases  Network & data segregation

Risk Management & Cloud Security February 19, Availability  Cloud provider service interruptions  Data location/availability for restoration  Network/connectivity interruptions  Failure of the provider to adhere to SLAs  Service provider disaster recovery Cloud Service Risks

Risk Management & Cloud Security February 19, Processing Integrity  Adherence to change management procedures  Incident management  Failure of the provider to adhere to SLAs Timeliness Accuracy Authorization Completeness Cloud Service Risks

Risk Management & Cloud Security February 19, Confidentiality  Comingling of data & other assets  Unauthorized access to sensitive or trade secret information Privacy  International laws affecting service provider location  Regulatory compliance/legal liability  Breach & incident management Cloud Service Risks

Risk Management & Cloud Security February 19, GOVERNANCE OF THE CLOUD Critical Policies, Procedures & Controls

Risk Management & Cloud Security February 19, Governance of the Cloud  Governance  Risk Management  Tools

Risk Management & Cloud Security February 19, Governance of the Cloud  Governance  Risk Management  Tools Information Security Data life cycle Data classification Formal policies & procedures

Risk Management & Cloud Security February 19, Governance of the Cloud  Governance  Risk Management  Tools Metrics Objectives Define metrics Periodic assessment & Review

Risk Management & Cloud Security February 19, Governance of the Cloud  Governance  Risk Management  Tools SLAs Access to data Appropriate Controls Management, counsel, IT & business owners involved

Risk Management & Cloud Security February 19, Governance of the Cloud  Governance  Risk Management  Tools Data Flow Analysis Understand life cycle Develop data-flow schematics Policies to review/update data flow documentation

Risk Management & Cloud Security February 19, Governance of the Cloud  Governance  Risk Management  Tools Managing Computing Risk App & Tech Inventory In conjunction with data flow analysis Address each layer of cloud “stack” risk.

Risk Management & Cloud Security February 19, Governance of the Cloud  Governance  Risk Management  Tools Audit & Compliance Regulatory implications Use risk assessment tools and control frameworks Assess control maturity Vendor management

Risk Management & Cloud Security February 19, Governance of the Cloud  Governance  Risk Management  Tools Control Frameworks (NIST, COBIT, CSA) CIS Security Metrics v1.0.0 Cloud Security Alliance NIST SP NIST SP

Risk Management & Cloud Security February 19, Procedures/Tools Links NIST Guidance Cloud Security Alliance (CSA) Information System Audit and Control Association (ISACA) Computing-Management-Audit-Assurance-Program.aspx Computing-Management-Audit-Assurance-Program.aspx The Center for Internet Security (CIS) Governance of the Cloud

Risk Management & Cloud Security February 19, THIRD-PARTY MANAGEMENT CONSIDERATIONS FOR THE CLOUD

Risk Management & Cloud Security February 19, Third-Party Management Use of the cloud  Transfers risk  Reduces control Requires new control considerations  Service-level management  Third-party management

Risk Management & Cloud Security February 19, Third-Party Management What Can You Do? Define service levels for financial report systems Create a framework to manage service level agreements KPIs A designated individual responsible monitoring & reporting service level performance Organization vendor management policy for the selection of outsources services Determines that, before selection, potential third parties are qualified on 1) capability to deliver the service and 2) a review of their financial viability

Risk Management & Cloud Security February 19, Third-Party Management What Can You Do? Third-party service contracts address risks, security controls & procedures for information systems & Procedures ensure that a formal contract is defined & agreed upon for all third-party services before work is initiated, including definition of internal control requirements & acceptance of the organization’s policies & procedures A regular review of security, availability & processing integrity is performed for service-level agreements & related contracts with third-party service providers

Risk Management & Cloud Security February 19, Service Organization Control Reports SOC 1SOC 2SOC 3 1 Internal Control Over Financial Reporting 2 Service Organization Management, Users, Users Auditor 3 Service Organization Management, Users, Knowledgeable Parties SOC 1SOC 2SOC 3 PurposeReport on controls relevant to user entities ICFR 1 Report on controls related to compliance & operations SOC 1SOC 2SOC 3 PurposeReport on controls relevant to user entities ICFR 1 Report on controls related to compliance & operations Use of ReportRestricted 2 Restricted 3 General SOC 1SOC 2SOC 3 PurposeReport on controls relevant to user entities ICFR 1 Report on controls related to compliance & operations Use of ReportRestricted 2 Restricted 3 General Report DetailIncludes Testing Detail No Testing Detail SOC 1SOC 2SOC 3 PurposeReport on controls relevant to user entities ICFR 1 Report on controls related to compliance & operations Use of ReportRestricted 2 Restricted 3 General Report DetailIncludes Testing Detail No Testing Detail AICPA Interpretive Guidance SSAE 16 & AICPA Guide AT 101, Trust Services Principles, & AICPA Guide AT 101 & Trust Services Principles

Risk Management & Cloud Security February 19, R ISK M ANAGEMENT AND C LOUD S ECURITY Rodney A. Walsh, CGEIT, CRISC Director of IT Risk Services Paco Diaz, CISA Senior Consultant II Thank You