Simple cloud security explanation

14
Security Imperatives when selecting your vendor

Transcript of Simple cloud security explanation

Page 1: Simple cloud security explanation

Security Imperatives when selecting your vendor

Page 2: Simple cloud security explanation

Agenda•What are the key components of Cloud Computing?

•How is vendor / solution selection done?

•What are the key criteria from Cloud information security perspective?

•How to jump start the process of adoption of Cloud?

Page 3: Simple cloud security explanation

The reason we are talking about information security here today

Page 4: Simple cloud security explanation

Simple analogy of cloud computing and its components

Page 5: Simple cloud security explanation

Key phases of fact based solution / vendor selection

Page 6: Simple cloud security explanation

Key criteria for solution and vendor selection for cloud

Page 7: Simple cloud security explanation

Key stakeholders in cloud security and their requirements

Page 8: Simple cloud security explanation

Key cloud security criteria – Information Security, Privacy, Compliance and Legal

Forrester Cloud Security Alliance Gartner Others

Data protection Identity management

Governance and Enterprise Risk Management

Privileged User Access Policy, standards, and guidelines

Physical and personnel security Legal and Electronic Discovery Regulatory Compliance Transparency

Availability Compliance and Audit Data Location Personnel security

Application security Information Lifecycle Management Data segregation Third party providers

Privacy Portability and Interoperability Recovery Legal

Business continuity and data recovery

Traditional Security, Business Continuity and Disaster Recovery

Investigative Support Business Continuity

Logs and audit trails Data Center Operations Long term viability Resource Provisioning

Unique compliance requirements Incident Response, Notification and Remediation

Software assurance

Records Application Security Network security

Host and VM securityEncryption and Key Management

Identity and Access Management Identity and access management

Virtualization Authentication

Key managementCryptography

Operational Security

Page 9: Simple cloud security explanation

Key cloud regulatory considerations

Page 10: Simple cloud security explanation

Detailed questions for each area - SamplesChecklist : Personnel SecurityPersonnel Security• Are there policies and procedures for:• Hiring employees who will have access to or control over cloud components?• Pre-employment checks for personnel with privileged access?• Are personnel security policies consistent across locations?• Do they apply to online cloud systems and data as well as to offline systems that either stored data or to offline systems that will be provisioned for online use?• Is there a security education program, and if so, how extensive is it?• Is personnel security frequently reviewed to determine if employees with access should continue to have access?• Are personnel required to have and maintain security certifications?• Does physical access to the CSP’s facility require background checks?

Checklist : LegalLegal• Where—in which jurisdiction—will data be stored?• Where—in which jurisdiction—is the CSP incorporated?• Does the CSP use third party providers who are not located in the same jurisdiction?• Does the CSP subcontract any services or personnel?• Does the CSP use a customer’s data in any manner that is not part of the service?• Does the CSP have a documented procedure for responding to legal requests (such as a subpoena) for customer data?• In the event of a subpoena, how does the CSP produce data for a single customer only without providing non-subpoena data?• Is the CSP insured against losses, including remuneration for customer losses due to CSP outages or data exposure?

Page 11: Simple cloud security explanation

Detailed questions for each area - SamplesChecklist :Third Party ProvidersThird Party Providers• Are any services or functions provided by a third party?• If any part of a cloud is subcontracted or otherwise outsourced, does the providing party comply with the same policy and standards that the CSP enforces?• If used, are third party providers audited for compliance with the CSPs policies and standards?• Does the CSP security policy (or equivalent) and governance extend to all third party providers?

Checklist : Network SecurityNetwork Security• What controls are in place to manage externally sourced and internally sourced attacks, including distributed denial of service (DDoS)?• For customers, how is isolation managed between VMs by the hypervisor?• For customers, how is isolation managed between VMs by network hardware and routing?• What standards or best practices are used to implement virtual network infrastructure?• How are MAC spoofing, ARP poisoning, and so on protected against?• How is isolation managed between customer accessed/routable systems and cloud management systems and infrastructure?• Is cloud customer processing dependent on off-cloud tenant components such as LDAP?• Does the CSP perform periodic penetration testing against the cloud?• If so, is penetration testing done both from external to the cloud and from inside the cloud and the cloud infrastructure?• Does the CSP perform vulnerability testing of the cloud infrastructure, cloud management, and also customer accessible components?• How are identified vulnerabilities tracked and addressed?• Is vulnerability information made available to customers?• Does the CSP allow customers to perform vulnerability testing against the customer’s own VMs or other containers?

Page 12: Simple cloud security explanation

Why is there uncertainty when it comes to cloud adoption

Page 13: Simple cloud security explanation

Step wise selection of vendor / solution

Page 14: Simple cloud security explanation

We are Big 4 Consultants. Contact us [email protected] for details