the cloud is in the details webinar - rothke

37
The cloud is in the details – policy and requirements in the era of cloud computing Ben Rothke, CISSP CISA BT Global Services Senior Security Consultant

Upload: ben-rothke

Post on 11-Nov-2014

972 views

Category:

Technology


1 download

DESCRIPTION

The Cloud is in the details webinar - Policy & Requirements in the era of cloud computing, by Ben Rothke. March 2011

TRANSCRIPT

Page 1: The Cloud is in the details webinar - Rothke

The cloud is in the details –policy and requirements in the era of cloud computing

Ben Rothke, CISSP CISABT Global Services

Senior Security Consultant

Page 2: The Cloud is in the details webinar - Rothke

About me

• Ben Rothke (too many certifications)• Senior Security Consultant – British

Telecom• Frequent writer and speaker• Author - Computer Security: 20 Things

Every Employee Should Know

Page 3: The Cloud is in the details webinar - Rothke

Agenda/Key take-away thought

• Agenda– Overview of the need to create specific

requirements & policies for a cloud initiative

• Take-away– Contractors would never start building without

plans and designs; a cloud project similarly shouldn’t be started without appropriate plans and designs and requirements definition

Page 4: The Cloud is in the details webinar - Rothke

The cloud is here to stay

Page 5: The Cloud is in the details webinar - Rothke

Don’t let your cloud project drive you bananas

Page 6: The Cloud is in the details webinar - Rothke

Cloud computing-choose your definition

• Definition #1– Process you don’t full understand, manage poorly and is out

of control, that you give to a cloud provider, with the hope and prayer that they can make sense of it and miraculously make it work; and be HIPAA, SoX and PCI compliant

• Definition #2– Corporate strategic decision to use service-oriented

architecture and utility computing to on-demand network access to a shared pool of configurable computing resources; that support the firm’s tactical IT plans and long-term goals

Page 7: The Cloud is in the details webinar - Rothke

Cloud challenges

• Making cloud meet business requirements• integrating cloud into applications• producing documentation to deliver trust• management and reliability• planning and deployment• managing migration and scalability

Page 8: The Cloud is in the details webinar - Rothke

Cloud security challenges

• Authentication, identity management• compliance and regulatory• access control• trust management• policy• logging and accounting• privacy and data protection

Page 9: The Cloud is in the details webinar - Rothke

CSA Top Threats

1. Abuse and Nefarious Use of Cloud Computing

2. Insecure Interfaces and APIs 3. Malicious Insiders4. Shared Technology Issues5. Data Loss or Leakage6. Account or Service Hijacking7. Unknown Risk Profile

Page 10: The Cloud is in the details webinar - Rothke

The $64,000 cloud question

What is your security problem and how do you expect cloud services to solve it?

• Biggest mistake with cloud computing is that firms run to it without knowing why

• Then they use it with no plan for deployment

Page 11: The Cloud is in the details webinar - Rothke

Other ill-defined projects

• Information Week, Computer World, etc., continuously have stories about large projects ($25 - $200 million) that fail

• Why do these large Oracle, ERP, cloud, SAP projects continuously fail?– often inadequate, changing or conflicting

requirements

Page 12: The Cloud is in the details webinar - Rothke

Cloud success metrics

Cloud success is measured with the following business questions:

– does it deliver real business benefits?– was it deployed quickly and cost-effectively?– is it secure and does it provide trust?– is it reliable and easy to use?– can it be managed?– can it evolve and scale?

Page 13: The Cloud is in the details webinar - Rothke

What is your deployment plan?

• Typical cloud project is likely to be more complex than previous experience of typical IT projects may suggest

• As well as project management, technical and operational aspects, there are many policy, legal and security issues which must not be neglected

• By understanding and defining appropriate requirements, many of the potential traps and pitfalls can be avoided

• The risks to the business and the project are reduced and those that remain are quantified at an early stage

Page 14: The Cloud is in the details webinar - Rothke

Successful cloud deployment steps1. Requirements Analysis

– Identify business, operational, commercial and security requirements2. Architecture Definition

– Detailed definition of the operating model and cloud architecture3. Operations

– Production of operational policies and procedures4. Security Review

– Security review of the proposed system design, architecture and operations5. Integration

– System piloting, integration of cloud enabled applications and testing6. Deployment

– Operational deployment and production roll-out7. Post-Deployment

– Management of upgrades and change processes for the production cloud

Page 15: The Cloud is in the details webinar - Rothke

Step 1 - Requirements Analysis

• First step in implementing any cloud based solution is to understand the requirements:– what’s the problem and how do you expect a

cloud to solve it?– what are the business drivers?– what level of security is appropriate?– where are the system vulnerabilities?– what are the legal and regulatory compliance

constraints?

Page 16: The Cloud is in the details webinar - Rothke

Step 1 - Requirements Analysis

• These requirements must be clearly identified and analyzed

• Analysis of the costs and business benefits and the provision of suitable project planning schemes are integral to step 1 – If the requirements aren’t clear, do not go

forward

Page 17: The Cloud is in the details webinar - Rothke

Step 1 - Requirements Analysis – Project Planning

• Project manager is essential– Some large-scale projects may need multiple

managers

• PM must be given the resources, responsibility and authority to successfully deliver the cloud project

• Attempts to implement a cloud without PM have invariably resulted in failed projects

Page 18: The Cloud is in the details webinar - Rothke

Step 2 - Architecture Definitions

• Once the requirements are known, the next step is to produce an operating model and to design the chosen cloud architecture

• At this stage, cloud enabling of end user applications is also considered, allowing parallel development

Page 19: The Cloud is in the details webinar - Rothke

Step 2 - Architecture Definitions

Create set of documentation templates and checklists to:

– define how the cloud will be operated– define how trust will be passed between entities– define the cloud architecture, taking account of practical issues

such as resilience, management, performance, security, scalability and current industry standards and best practices

– specify what the architecture will comprise – specify how end-entity applications are to be cloud-enabled – specify how the complete cloud will be tested and supported – produce a detailed project plan

Page 20: The Cloud is in the details webinar - Rothke

Step 2 – Cloud architecture

• Public• private • hybrid• community

• What is the best architecture for you?• The one that meets your specific

requirements and needs

Page 21: The Cloud is in the details webinar - Rothke

Step 3 � Operations

• Identify the policies, procedures, support issues and SLA

• Organizational issues delineate who is responsible for the various parts of the cloud

• Any security system is only as effective to the degree it is correctly operated – define the operating procedures and controls

necessary to make sure that that the cloud security system remains effective

Page 22: The Cloud is in the details webinar - Rothke

Step 4 – Security Review

• With any system it is important to understand where the risks are and where the system is most vulnerable – Nothing will ever be 100% secure

• At this stage, the cloud is well specified and therefore it is important that the proposed system is subjected to an independent review and risk analysis and, where appropriate, corrective action is taken

Page 23: The Cloud is in the details webinar - Rothke

Step 4 – Security Review

• The cloud is inherently unsafe and untrusted

• your job is to add the controls necessary to be a safe and trusted environment

Page 24: The Cloud is in the details webinar - Rothke

Step 4 – Security Review

• Detailed lists of the threats, vulnerabilities and countermeasures– If you have an insecure infrastructure, then

you will have an insecure cloud

• Creation of the system security policy provides a baseline level of security controls that must be implemented during cloud deployment

Page 25: The Cloud is in the details webinar - Rothke

Step 4 - Risk analysis & assessment

• Effective risk assessment and analysis ensures you are worrying about the right things

• Ultimate outcome of a risk analysis should be to see if you really can benefit from the product – Don’t worry about missing the bus

Page 26: The Cloud is in the details webinar - Rothke

• Some companies have determined at Step 4 that they really do not want to / can’t move forward

• Don’t be afraid to cancel a cloud project if there is not a business need for it, or if the security risks are too great

Step 4 - Risk analysis & assessment

Page 27: The Cloud is in the details webinar - Rothke

Step 4 – Cloud web applications

• Browsers are very complicated security environments

• understand how malware can thrive in a cloud environment

Page 28: The Cloud is in the details webinar - Rothke

Step 4 - Policy

• Create and maintain policies on how you will address the many cloud security issues– identify threats to the cloud environment & its

contents; ensure you address current threats– metrics for monitoring – accountability– incident response– adequate training for new/transitioned staff

Page 29: The Cloud is in the details webinar - Rothke

Step 4 – Shared responsibilities

• Cloud provider– Responsible for security from the data center

to the hypervisor

• Client– Responsible for security for the operating

system and all applications

• But Saas, PaaS & IaaS will have different shared responsibility models

Page 30: The Cloud is in the details webinar - Rothke

Step 5 � Integration

• Integration of all the cloud components and the building of a pilot system against which all the functional, performance and operational requirements can be tested

• Integration testing of any cloud-enabled applications is also performed

• DR/BCP– Enterprise cloud be available 24 x 7 x 365

Page 31: The Cloud is in the details webinar - Rothke

Step 6 � Deployment

• This step involves the installation and validation of the operational cloud, followed by acceptance testing

• A security review and penetration test is included to ensure that the actual implementation meets all the security requirements

• Documentation is finalized and published• Acceptance testing

Page 32: The Cloud is in the details webinar - Rothke

Step 6 � Deployment

• Project closure meeting and report– Customer agrees that all planned project

activities have been completed, project performance information has been captured and the cloud project is properly closed

– Projects have a defined duration, but without a formal project closure activity, a project can drift and never be satisfactorily concluded

Page 33: The Cloud is in the details webinar - Rothke

Step 7 � Post-deployment

• All systems are subject to change and cloud is no exception – Well-designed cloud should be able to

integrate new requirements without having to be re-engineered

Page 34: The Cloud is in the details webinar - Rothke

References• Cloud Computing Risk Assessment

– www.enisa.europa.eu/act/rm/files/deliverables/loud-computing-risk-assessment

• Security Guidance for Critical Areas of Focus– www.cloudsecurityalliance.org/csaguide.pdf

• Cloud Security Guidance– www.redbooks.ibm.com/redpapers/pdfs/redp4614.pdf

• Top Threats to Cloud Computing– www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf

• Cloud Security and Compliance: A Primer– www.sans.org/reading_room/analysts_program/mcafee_carbird_08_2010.pdf

Page 35: The Cloud is in the details webinar - Rothke

Conclusion

• Cloud computing is a powerful platform• But don’t attempt to roll-out an enterprise-

wide cloud without a well-defined plan and adequate security requirements

Page 36: The Cloud is in the details webinar - Rothke

Contact information

• Ben Rothke, CISSP CISA • Senior Security Consultant• BT Professional Services• [email protected]

• www.linkedin.com/in/benrothke• www.twitter.com/benrothke• www.slideshare.net/benrothke

Page 37: The Cloud is in the details webinar - Rothke

���������Click on the questions tab on your screen, type in your question, name

and e-mail address; then hit submit.