SlideShare a Scribd company logo
1 of 43
Download to read offline
Cloud Computing
Enterprise Risks and Mitigation

Anchises M. G. de Paula
iDefense Intelligence Analyst
Nov. 2009
                                  GTS - 14
Agenda




                                                             source: sxc.hu
                       Overview of cloud computing


                          Cloud computing risks and
                         generic mitigation strategies


                    Cloud Computing for Malicious
                                            Intent

              Questions and answers

                     GTS - 14                            2

22
                    Copyright iDefense 2009
Overview of cloud
    computing




3
        GTS - 14                 3

       Copyright iDefense 2009
Overview


     The term “cloud computing” is poorly defined




                                 GTS - 14                 4

44
                                Copyright iDefense 2009
Overview


     The term “cloud computing” is poorly defined




          “Cloud computing is a model for enabling convenient,
          on-demand network access to a shared pool of
          configurable computing resources (e.g., networks,
          servers, storage, applications, and services) that can
          be rapidly provisioned and released with minimal
          management effort or service provider interaction.”
          Source: http://csrc.nist.gov/groups/SNS/cloud-computing/index.html




                                              GTS - 14                         5

55
                                             Copyright iDefense 2009
Overview


     The term “cloud computing” is poorly defined




       “Essential Cloud Characteristics:
       • On-demand self-service
       • Broad network access
       • Resource pooling
       • Location independence
       • Rapid elasticity
       • Measured service”



                                   GTS - 14                 6

66
                                  Copyright iDefense 2009
Overview


     The term “cloud computing” is poorly defined




                                 GTS - 14                 7

77
                                Copyright iDefense 2009
Overview


     The term “cloud computing” is poorly defined




     Multiple vendors, multiple definitions




     Utility pricing model




     Cloud-based Service Provider (CSP) handle burden of resources

                                  GTS - 14                           8

88
                                 Copyright iDefense 2009
Overview


     Three basic categories for cloud computing technologies:
     – Infrastructure as a Service (IaaS)




                                                            Resource Abstraction
     – Platform as a Service (PaaS)




     – Software as a Service (SaaS)



                                   GTS - 14                                        9

99
                                  Copyright iDefense 2009
Variations on a Theme


      Public Cloud




 10
                         GTS - 14                 10

10
                        Copyright iDefense 2009
Variations on a Theme


      Public Cloud
      Private Cloud




 11
                         GTS - 14                 11

11
                        Copyright iDefense 2009
Variations on a Theme


      Public Cloud
      Private Cloud
      Hybrid Cloud




 12
                         GTS - 14                 12

12
                        Copyright iDefense 2009
Cloud computing risks and
     generic mitigation
     strategies




13
         GTS - 14                 13

        Copyright iDefense 2009
Areas of Risk


       ▪   Privileged User Access
       ▪   Data Segregation
       ▪   Regulatory Compliance
       ▪   Physical Location of Data
       ▪   Availability
       ▪   Recovery
       ▪   Investigative Support
       ▪   Viability and Longevity



 14
                               GTS - 14                 14

14
                              Copyright iDefense 2009
Mitigation Strategies


      Understand the risks


      Evaluate any potential
      cloud-based solution and CSP


      Unique solution, generic risks



                                                       source: sxc.hu



 15
                              GTS - 14                                  15

15
                             Copyright iDefense 2009
Risks

      Privileged User Access:
      • CSP must have access
      • Improper access -> Data Exposure
      • HR policies
      • 3rd party of a 3rd party




 16
                                    GTS - 14                 16

16
                                   Copyright iDefense 2009
Mitigation

      Privileged User Access:
       • CSP must have access
       • Improper access -> Data Exposure
       • HR policies
       • 3rd party of a 3rd party



      Privilege Access Control Mitigation:
       – Support to HR and data policies
       – Outsourcing involved?
       – Evaluate the access controls




 17
                                         GTS - 14                 17

17
                                        Copyright iDefense 2009
Risks

      Data Segregation:
      • Shared common resources
      • Multiple consumers, same physical machine
      • Failure to segregate data: data exposure, loss
        or corruption




 18
                                      GTS - 14                 18

18
                                     Copyright iDefense 2009
Risks

      Data Segregation:
      • Shared common resources
      • Multiple consumers, same physical machine
      • Failure to segregate data: data exposure, loss
        or corruption




 19
                                      GTS - 14                 19

19
                                     Copyright iDefense 2009
Risks

      Data Segregation:
      • Shared common resources
      • Multiple consumers, same physical machine
      • Failure to segregate data: data exposure, loss
        or corruption




 20
                                      GTS - 14                 20

20
                                     Copyright iDefense 2009
Mitigation

      Data Segregation:
      • Shared common resources
      • Multiple consumers, same physical machine
      • Failure to segregate data: data exposure, loss
        or corruption


      Data Segregation Mitigation:
      – What’s the risk of data segregation failure?
      – Encryption of data: shifting of risks
      – Understand the “how, where, when”
        of consumer data storage




 21
                                         GTS - 14                 21

21
                                        Copyright iDefense 2009
Risks


      Regulatory Compliance:
      – Regulations for sensitive information and outsourcing
      – Conflicting regulations and laws
      – Failure to comply: significant legal risks




 22
                                      GTS - 14                  22

22
                                     Copyright iDefense 2009
Mitigation


      Regulatory Compliance:
       – Regulations for sensitive information and outsourcing
       – Conflicting regulations and laws
       – Failure to comply: significant legal risks



      Regulatory Control Mitigation:                             FISMA
       – Know your regulatory obligation                         HIPAA
       – Know your CSP’s regulatory obligations                  SOX
                                                                 PCI
       – Understand your liabilities
                                                                 SAS 70
       – Location may change regulatory obligations              Audits




 23
                                        GTS - 14                          23

23
                                       Copyright iDefense 2009
Risks


      Physical Location of Data:
       – Location, location, location
       – Location tied to regulatory issues
       – Volatile regions introduce a higher
         degree of risk
       – Hostile/Unethical governments have unforeseen risk of data exposure




 24
                                         GTS - 14                              24

24
                                        Copyright iDefense 2009
Risks


      Physical Location of Data:
       – Location, location, location
       – Location tied to regulatory issues
       – Volatile regions introduce a higher
         degree of risk
       – Hostile/Unethical governments have unforeseen risk of data exposure

                                                              10/9/09
                                                              SA pigeon 'faster than
                                                              broadband'
                                                              BBC News
                                                              Cyber A Durban IT company pitted an 11-month-
                                                              old bird armed with a 4GB memory stick against
                                                              the ADSL service from the country's biggest web
                                                              firm, Telkom.
                                                              Winston the pigeon took two hours to carry the
                                                              data 60 miles - in the same time the ADSL had
                                                              sent 4% of the data. computers.




 25
                                         GTS - 14                                                               25

25
                                        Copyright iDefense 2009
Mitigation


      Physical Location of Data:
       – Location, location, location
       – Location tied to regulatory issues
       – Volatile regions introduce a higher
         degree of risk
       – Hostile/Unethical governments have unforeseen risk of data exposure


      Physical Location of Data Mitigation:
       – Identify your data’s location
       – Avoid CSPs that cannot guarantee the location
       – Avoid CSPs that use data centers in hostile countries
       – Use CSPs that reside in consumer’s country


 26
                                         GTS - 14                              26

26
                                        Copyright iDefense 2009
Risks


      Availability:
       – Constant connectivity required
       – Any failure terminating connectivity
         is a risk
       – Data loss and downtime risks




 27
                                      GTS - 14                 27

27
                                     Copyright iDefense 2009
Risks


      Availability:
       – Constant connectivity required
       – Any failure terminating connectivity
         is a risk
       – Data loss and downtime risks




 28
                                      GTS - 14                 28

28
                                     Copyright iDefense 2009
Mitigation


      Service Availability Mitigation:
       – Availability is the greatest risk !
       – Understand the CSP’s infrastructure:
         avoid single points of failure
       – Private clouds may reduce the
         availability risk, but introduce additional
         cost and overhead
       – Establish service-level agreements
         (SLAs) with their CSPs
       – Balance the risk introduced by using
         multiple data centers with the risk of a
         single site failure
       – Assume at least one outage, what’s the
         impact to you?


 29
                                        GTS - 14                 29

29
                                       Copyright iDefense 2009
Risks


      Recovery:
      – Improper backups or system failure
      – The more data, more data loss risk
      – Recovery time is operational downtime




 30
                                   GTS - 14                 30

30
                                  Copyright iDefense 2009
Mitigation


      Recovery:
      – Improper backups or system failure
      – The more data, more data loss risk
      – Recovery time is operational downtime


      Recovery Mitigation:
      – Understand backed up systems
        (Encrypted? Multiple sites?)
      – Identify the time required to completely
        recover data
      – Practice a full recovery to test the
        CSP’s response time



 31
                                       GTS - 14                31

31
                                     Copyright iDefense 2009
Risks


      Investigative Support:
       – Multiple consumers, aggregated logs
       – CSPs may hinder incident responses
       – Uncooperative CSPs: lost forensic data
         and investigation hindrances




 32
                                    GTS - 14                 32

32
                                   Copyright iDefense 2009
Mitigation


      Investigative Support:
       – Multiple consumers, aggregated logs
       – CSPs may hinder incident responses
       – Uncooperative CSPs: lost forensic data
         and investigation hindrances



      Investigative Support Mitigation:
       – Establish policies and procedures with the CSP
       – Avoid CSPs unwilling to participate in incident




 33
                                      GTS - 14                 33

33
                                     Copyright iDefense 2009
Risks


      Viability and Longevity:
       – CSP failure can occur at any time, for any reason
       – Risk of data loss and operational downtime
       – Large companies sometimes terminate services
       – Abrupt shutdowns are a more significant risk




 34
                                     GTS - 14                 34

34
                                    Copyright iDefense 2009
Mitigation


      Viability and Longevity:
       – CSP failure can occur at any time, for any reason
       – Risk of data loss and operational downtime
       – Large companies sometimes terminate services
       – Abrupt shutdowns are a more significant risk



      Viability and Longevity Mitigation:
       – Understand the way a CSP can “going dark”
       – Have a secondary CSP in mind
       – Review the history and financial stability of
         any CSP prior to engaging



 35
                                      GTS - 14                 35

35
                                     Copyright iDefense 2009
Cloud Computing for
     Malicious Intent




36
         GTS - 14                 36

        Copyright iDefense 2009
Malicious use




                                                               source: sxc.hu
      Bad guys are already using such technology ;)
      – Botnets
      – Hacking as a Service, SPAM




 37
                                 GTS - 14                 37

37
                                Copyright iDefense 2009
Malicious use




                                                                                                                        source: sxc.hu
      Bad guys are already using such technology
      – Botnets
      – Hacking as a Service, SPAM                            11/9/09
                                                              Bot herders hide master
                                                              control channel in Google
                                                              cloud
                                                              by Dan Goodin, The Register
                                                              Cyber criminals' love affair with cloud computing
      Malicious use of Cloud Services                         just got steamier with the discovery that Google's
                                                              AppEngine was tapped to act as the master
                                                              control channel that feeds commands to large
      – C&C Server on the cloud                               networks of infected computers.

      – Storage of malicious data
      – Cracking passwords




 38
                                     GTS - 14                                                                      38

38
                                    Copyright iDefense 2009
Conclusion




39
         GTS - 14                 39

        Copyright iDefense 2009
Conclusions


      Understanding the risk of cloud-based solutions
      Understand the level of sensitivity of your data
      Perform due diligence when evaluating a CSP
      Identify the location of your data
      Get assurance that your data will remain where
      it is placed.




      Cloud computing is a new technology still experiencing growing pains.
      Enterprises must be aware of this and anticipate the risks the
      technology introduces.

 40
                                    GTS - 14                                  40

40
                                   Copyright iDefense 2009
Additional Reading


      Cloud Security Alliance (CSA): “Security Guidance for
      Critical Areas of Focus in Cloud Computing”
            http://www.cloudsecurityalliance.org/guidance/csaguide.pdf

      NIST Cloud Computing Project
            http://csrc.nist.gov/groups/SNS/cloud-computing/index.html

      ENISA report on “Cloud Computing: Benefits, risks
      and recommendations for information security”
       http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-
                                      assessment

      iDefense Topical Research Paper: “Cloud Computing”


 41
                                     GTS - 14                                       41

41
                                    Copyright iDefense 2009
Q&A

 GTS - 14                 42

Copyright iDefense 2009
Thank You

Anchises M. G. de Paula
iDefense Intelligence Analyst




                                43

More Related Content

What's hot

Cloud computing
Cloud computingCloud computing
Cloud computingSyam Lal
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsViresh Suri
 
Introduction to Cloud Computing
Introduction to Cloud Computing Introduction to Cloud Computing
Introduction to Cloud Computing CloudSyntrix
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
On Premise vs Cloud Computing | Cloud Certification Training | Edureka
On Premise vs Cloud Computing | Cloud Certification Training | EdurekaOn Premise vs Cloud Computing | Cloud Certification Training | Edureka
On Premise vs Cloud Computing | Cloud Certification Training | EdurekaEdureka!
 
Cloud computing presentation
Cloud computing presentation  Cloud computing presentation
Cloud computing presentation hemanth S R
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingveena venugopal
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Samrat Das
 
Cloud Migration: Moving Data and Infrastructure to the Cloud
Cloud Migration: Moving Data and Infrastructure to the CloudCloud Migration: Moving Data and Infrastructure to the Cloud
Cloud Migration: Moving Data and Infrastructure to the CloudSafe Software
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Mahesh Tibrewal
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computingnitinw25
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud securityRaj Sarode
 

What's hot (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
Introduction to Cloud Computing
Introduction to Cloud Computing Introduction to Cloud Computing
Introduction to Cloud Computing
 
cloud computing
cloud computingcloud computing
cloud computing
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
On Premise vs Cloud Computing | Cloud Certification Training | Edureka
On Premise vs Cloud Computing | Cloud Certification Training | EdurekaOn Premise vs Cloud Computing | Cloud Certification Training | Edureka
On Premise vs Cloud Computing | Cloud Certification Training | Edureka
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing presentation
Cloud computing presentation  Cloud computing presentation
Cloud computing presentation
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
 
Aws ppt
Aws pptAws ppt
Aws ppt
 
Cloud Migration: Moving Data and Infrastructure to the Cloud
Cloud Migration: Moving Data and Infrastructure to the CloudCloud Migration: Moving Data and Infrastructure to the Cloud
Cloud Migration: Moving Data and Infrastructure to the Cloud
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
 
Virtualization vs. Cloud Computing: What's the Difference?
Virtualization vs. Cloud Computing: What's the Difference?Virtualization vs. Cloud Computing: What's the Difference?
Virtualization vs. Cloud Computing: What's the Difference?
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 

Viewers also liked

Annova Consulting - Final Presentation
Annova Consulting - Final PresentationAnnova Consulting - Final Presentation
Annova Consulting - Final Presentationmabar207
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Brian K. Dickard
 
Legacy Software to Cloud Progression - Part 1
Legacy Software to Cloud Progression - Part 1Legacy Software to Cloud Progression - Part 1
Legacy Software to Cloud Progression - Part 1Dreamztech Solutions
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud ComputingMartin Bioh
 
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...Tech and Law Center
 
data storage security technique for cloud computing
data storage security technique for cloud computingdata storage security technique for cloud computing
data storage security technique for cloud computinghasimshah
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself Alert Logic
 
Cloud Computing security Challenges for Defense Forces
Cloud Computing security Challenges for Defense ForcesCloud Computing security Challenges for Defense Forces
Cloud Computing security Challenges for Defense Forcescommandersaini
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptYogi Dadhich
 
Ensuring data storage security in cloud computing
Ensuring data storage security in cloud computingEnsuring data storage security in cloud computing
Ensuring data storage security in cloud computingUday Wankar
 
Are you using mail policies effectively to secure your mail
Are you using mail policies effectively to secure your mail Are you using mail policies effectively to secure your mail
Are you using mail policies effectively to secure your mail Mithi SkyConnect
 
Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011commandersaini
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptAmex Ka
 
4 approaches to securing documents and email attachment assets
4 approaches to securing documents and email attachment assets4 approaches to securing documents and email attachment assets
4 approaches to securing documents and email attachment assetsMithi SkyConnect
 
Email phising and spoofing hurting your business
Email phising and spoofing hurting your businessEmail phising and spoofing hurting your business
Email phising and spoofing hurting your businessMithi SkyConnect
 

Viewers also liked (20)

Manage Your Risks in the Cloud!
Manage Your Risks in the Cloud!Manage Your Risks in the Cloud!
Manage Your Risks in the Cloud!
 
Annova Consulting - Final Presentation
Annova Consulting - Final PresentationAnnova Consulting - Final Presentation
Annova Consulting - Final Presentation
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
 
Legacy Software to Cloud Progression - Part 1
Legacy Software to Cloud Progression - Part 1Legacy Software to Cloud Progression - Part 1
Legacy Software to Cloud Progression - Part 1
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
 
data storage security technique for cloud computing
data storage security technique for cloud computingdata storage security technique for cloud computing
data storage security technique for cloud computing
 
CS III.1 T. Jorgensen
CS III.1   T. JorgensenCS III.1   T. Jorgensen
CS III.1 T. Jorgensen
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Cloud Computing security Challenges for Defense Forces
Cloud Computing security Challenges for Defense ForcesCloud Computing security Challenges for Defense Forces
Cloud Computing security Challenges for Defense Forces
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Ensuring data storage security in cloud computing
Ensuring data storage security in cloud computingEnsuring data storage security in cloud computing
Ensuring data storage security in cloud computing
 
Are you using mail policies effectively to secure your mail
Are you using mail policies effectively to secure your mail Are you using mail policies effectively to secure your mail
Are you using mail policies effectively to secure your mail
 
Telenor
TelenorTelenor
Telenor
 
From byod to cyod
From byod to cyodFrom byod to cyod
From byod to cyod
 
Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
4 approaches to securing documents and email attachment assets
4 approaches to securing documents and email attachment assets4 approaches to securing documents and email attachment assets
4 approaches to securing documents and email attachment assets
 
Email phising and spoofing hurting your business
Email phising and spoofing hurting your businessEmail phising and spoofing hurting your business
Email phising and spoofing hurting your business
 

Similar to Cloud computing - Risks and Mitigation - GTS

Executive Briefing: Strategic Issues Surrounding Cloud Services
Executive Briefing:  Strategic Issues Surrounding Cloud ServicesExecutive Briefing:  Strategic Issues Surrounding Cloud Services
Executive Briefing: Strategic Issues Surrounding Cloud ServicesWhitmeyerTuffin
 
The Changing Data Quality & Data Governance Landscape
The Changing Data Quality & Data Governance LandscapeThe Changing Data Quality & Data Governance Landscape
The Changing Data Quality & Data Governance LandscapeTrillium Software
 
The Complexities of Cloud Computing - The Rules are New, But is the Game
The Complexities of Cloud Computing - The Rules are New, But is the GameThe Complexities of Cloud Computing - The Rules are New, But is the Game
The Complexities of Cloud Computing - The Rules are New, But is the GameJanine Anthony Bowen, Esq.
 
Security in cloud (and grid) computing Overview
Security in cloud  (and grid) computing OverviewSecurity in cloud  (and grid) computing Overview
Security in cloud (and grid) computing OverviewTawanda Douglas Muringani
 
The Myths And Magic Of Cloud Computing
The Myths And Magic Of Cloud ComputingThe Myths And Magic Of Cloud Computing
The Myths And Magic Of Cloud Computingjayroy
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec
 
Roadmap and Technology Incubators
Roadmap and Technology IncubatorsRoadmap and Technology Incubators
Roadmap and Technology IncubatorsAngelo Corsaro
 
OMG DDS Tutorial - Part I
OMG DDS Tutorial - Part IOMG DDS Tutorial - Part I
OMG DDS Tutorial - Part IAngelo Corsaro
 
Tutorial 4 peter kustor
Tutorial 4 peter kustorTutorial 4 peter kustor
Tutorial 4 peter kustoregovernment
 
OMG DDS: The Data Distribution Service for Real-Time Systems
OMG DDS: The Data Distribution Service for Real-Time SystemsOMG DDS: The Data Distribution Service for Real-Time Systems
OMG DDS: The Data Distribution Service for Real-Time SystemsAngelo Corsaro
 
Emc vi pr global data services
Emc vi pr global data servicesEmc vi pr global data services
Emc vi pr global data servicessolarisyougood
 
Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?trentlivingston
 

Similar to Cloud computing - Risks and Mitigation - GTS (20)

Executive Briefing: Strategic Issues Surrounding Cloud Services
Executive Briefing:  Strategic Issues Surrounding Cloud ServicesExecutive Briefing:  Strategic Issues Surrounding Cloud Services
Executive Briefing: Strategic Issues Surrounding Cloud Services
 
The Changing Data Quality & Data Governance Landscape
The Changing Data Quality & Data Governance LandscapeThe Changing Data Quality & Data Governance Landscape
The Changing Data Quality & Data Governance Landscape
 
The Complexities of Cloud Computing - The Rules are New, But is the Game
The Complexities of Cloud Computing - The Rules are New, But is the GameThe Complexities of Cloud Computing - The Rules are New, But is the Game
The Complexities of Cloud Computing - The Rules are New, But is the Game
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Security in cloud (and grid) computing Overview
Security in cloud  (and grid) computing OverviewSecurity in cloud  (and grid) computing Overview
Security in cloud (and grid) computing Overview
 
The Myths And Magic Of Cloud Computing
The Myths And Magic Of Cloud ComputingThe Myths And Magic Of Cloud Computing
The Myths And Magic Of Cloud Computing
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR Compliance
 
Bird&Bird
Bird&BirdBird&Bird
Bird&Bird
 
Session19 Globus
Session19 GlobusSession19 Globus
Session19 Globus
 
Roadmap and Technology Incubators
Roadmap and Technology IncubatorsRoadmap and Technology Incubators
Roadmap and Technology Incubators
 
OMG DDS Tutorial - Part I
OMG DDS Tutorial - Part IOMG DDS Tutorial - Part I
OMG DDS Tutorial - Part I
 
MISA Cloud workshop - Cloud 101
MISA Cloud workshop - Cloud 101MISA Cloud workshop - Cloud 101
MISA Cloud workshop - Cloud 101
 
Tutorial 4 peter kustor
Tutorial 4 peter kustorTutorial 4 peter kustor
Tutorial 4 peter kustor
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
OMG DDS: The Data Distribution Service for Real-Time Systems
OMG DDS: The Data Distribution Service for Real-Time SystemsOMG DDS: The Data Distribution Service for Real-Time Systems
OMG DDS: The Data Distribution Service for Real-Time Systems
 
Emc vi pr global data services
Emc vi pr global data servicesEmc vi pr global data services
Emc vi pr global data services
 
Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?
 
Understanding the Cloud
Understanding the CloudUnderstanding the Cloud
Understanding the Cloud
 
Cloudcoputing
CloudcoputingCloudcoputing
Cloudcoputing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 

More from Anchises Moraes

Post pandemics threat scenario
Post pandemics threat scenarioPost pandemics threat scenario
Post pandemics threat scenarioAnchises Moraes
 
Como se proteger na internet
Como se proteger na internetComo se proteger na internet
Como se proteger na internetAnchises Moraes
 
Fatos, mitos e palpites do cenário de segurança pós-pandemia
Fatos, mitos e palpites do cenário de segurança pós-pandemiaFatos, mitos e palpites do cenário de segurança pós-pandemia
Fatos, mitos e palpites do cenário de segurança pós-pandemiaAnchises Moraes
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachAnchises Moraes
 
Praticas de gestão de segurança
Praticas de gestão de segurançaPraticas de gestão de segurança
Praticas de gestão de segurançaAnchises Moraes
 
Ciber crime e desafios de segurança durante uma pandemia e home office
Ciber crime e desafios de segurança durante uma pandemia e home officeCiber crime e desafios de segurança durante uma pandemia e home office
Ciber crime e desafios de segurança durante uma pandemia e home officeAnchises Moraes
 
Cyber Cultura em tempos de Coronavírus
Cyber Cultura em tempos de CoronavírusCyber Cultura em tempos de Coronavírus
Cyber Cultura em tempos de CoronavírusAnchises Moraes
 
Hunting bugs - C0r0n4con
Hunting bugs - C0r0n4conHunting bugs - C0r0n4con
Hunting bugs - C0r0n4conAnchises Moraes
 
Fintechs e os desafios de segurança
Fintechs e os desafios de segurançaFintechs e os desafios de segurança
Fintechs e os desafios de segurançaAnchises Moraes
 
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 20195 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019Anchises Moraes
 
Segurança além do Pentest
Segurança além do PentestSegurança além do Pentest
Segurança além do PentestAnchises Moraes
 
Só o Pentest não resolve!
Só o Pentest não resolve!Só o Pentest não resolve!
Só o Pentest não resolve!Anchises Moraes
 
Carreira em Segurança da Informação
Carreira em Segurança da InformaçãoCarreira em Segurança da Informação
Carreira em Segurança da InformaçãoAnchises Moraes
 
Carta de oposição ao Sindpd 2018
Carta de oposição ao Sindpd 2018Carta de oposição ao Sindpd 2018
Carta de oposição ao Sindpd 2018Anchises Moraes
 
Como se tornar um Jedi na área de Segurança
Como se tornar um Jedi na área de SegurançaComo se tornar um Jedi na área de Segurança
Como se tornar um Jedi na área de SegurançaAnchises Moraes
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?Anchises Moraes
 

More from Anchises Moraes (20)

Post pandemics threat scenario
Post pandemics threat scenarioPost pandemics threat scenario
Post pandemics threat scenario
 
Como se proteger na internet
Como se proteger na internetComo se proteger na internet
Como se proteger na internet
 
Fatos, mitos e palpites do cenário de segurança pós-pandemia
Fatos, mitos e palpites do cenário de segurança pós-pandemiaFatos, mitos e palpites do cenário de segurança pós-pandemia
Fatos, mitos e palpites do cenário de segurança pós-pandemia
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data Breach
 
Vamos caçar bugs!?
Vamos caçar bugs!?Vamos caçar bugs!?
Vamos caçar bugs!?
 
Praticas de gestão de segurança
Praticas de gestão de segurançaPraticas de gestão de segurança
Praticas de gestão de segurança
 
Ciber crime e desafios de segurança durante uma pandemia e home office
Ciber crime e desafios de segurança durante uma pandemia e home officeCiber crime e desafios de segurança durante uma pandemia e home office
Ciber crime e desafios de segurança durante uma pandemia e home office
 
Cyber Cultura em tempos de Coronavírus
Cyber Cultura em tempos de CoronavírusCyber Cultura em tempos de Coronavírus
Cyber Cultura em tempos de Coronavírus
 
Hunting bugs - C0r0n4con
Hunting bugs - C0r0n4conHunting bugs - C0r0n4con
Hunting bugs - C0r0n4con
 
Fintechs e os desafios de segurança
Fintechs e os desafios de segurançaFintechs e os desafios de segurança
Fintechs e os desafios de segurança
 
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 20195 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
 
Segurança além do Pentest
Segurança além do PentestSegurança além do Pentest
Segurança além do Pentest
 
Só o Pentest não resolve!
Só o Pentest não resolve!Só o Pentest não resolve!
Só o Pentest não resolve!
 
Carreira em Segurança da Informação
Carreira em Segurança da InformaçãoCarreira em Segurança da Informação
Carreira em Segurança da Informação
 
IoT Fofoqueiro
IoT FofoqueiroIoT Fofoqueiro
IoT Fofoqueiro
 
Carta de oposição ao Sindpd 2018
Carta de oposição ao Sindpd 2018Carta de oposição ao Sindpd 2018
Carta de oposição ao Sindpd 2018
 
Segurança na Internet
Segurança na InternetSegurança na Internet
Segurança na Internet
 
Como se tornar um Jedi na área de Segurança
Como se tornar um Jedi na área de SegurançaComo se tornar um Jedi na área de Segurança
Como se tornar um Jedi na área de Segurança
 
Deep Web e Ciber Crime
Deep Web e Ciber CrimeDeep Web e Ciber Crime
Deep Web e Ciber Crime
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

Cloud computing - Risks and Mitigation - GTS

  • 1. Cloud Computing Enterprise Risks and Mitigation Anchises M. G. de Paula iDefense Intelligence Analyst Nov. 2009 GTS - 14
  • 2. Agenda source: sxc.hu Overview of cloud computing Cloud computing risks and generic mitigation strategies Cloud Computing for Malicious Intent Questions and answers GTS - 14 2 22 Copyright iDefense 2009
  • 3. Overview of cloud computing 3 GTS - 14 3 Copyright iDefense 2009
  • 4. Overview The term “cloud computing” is poorly defined GTS - 14 4 44 Copyright iDefense 2009
  • 5. Overview The term “cloud computing” is poorly defined “Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” Source: http://csrc.nist.gov/groups/SNS/cloud-computing/index.html GTS - 14 5 55 Copyright iDefense 2009
  • 6. Overview The term “cloud computing” is poorly defined “Essential Cloud Characteristics: • On-demand self-service • Broad network access • Resource pooling • Location independence • Rapid elasticity • Measured service” GTS - 14 6 66 Copyright iDefense 2009
  • 7. Overview The term “cloud computing” is poorly defined GTS - 14 7 77 Copyright iDefense 2009
  • 8. Overview The term “cloud computing” is poorly defined Multiple vendors, multiple definitions Utility pricing model Cloud-based Service Provider (CSP) handle burden of resources GTS - 14 8 88 Copyright iDefense 2009
  • 9. Overview Three basic categories for cloud computing technologies: – Infrastructure as a Service (IaaS) Resource Abstraction – Platform as a Service (PaaS) – Software as a Service (SaaS) GTS - 14 9 99 Copyright iDefense 2009
  • 10. Variations on a Theme Public Cloud 10 GTS - 14 10 10 Copyright iDefense 2009
  • 11. Variations on a Theme Public Cloud Private Cloud 11 GTS - 14 11 11 Copyright iDefense 2009
  • 12. Variations on a Theme Public Cloud Private Cloud Hybrid Cloud 12 GTS - 14 12 12 Copyright iDefense 2009
  • 13. Cloud computing risks and generic mitigation strategies 13 GTS - 14 13 Copyright iDefense 2009
  • 14. Areas of Risk ▪ Privileged User Access ▪ Data Segregation ▪ Regulatory Compliance ▪ Physical Location of Data ▪ Availability ▪ Recovery ▪ Investigative Support ▪ Viability and Longevity 14 GTS - 14 14 14 Copyright iDefense 2009
  • 15. Mitigation Strategies Understand the risks Evaluate any potential cloud-based solution and CSP Unique solution, generic risks source: sxc.hu 15 GTS - 14 15 15 Copyright iDefense 2009
  • 16. Risks Privileged User Access: • CSP must have access • Improper access -> Data Exposure • HR policies • 3rd party of a 3rd party 16 GTS - 14 16 16 Copyright iDefense 2009
  • 17. Mitigation Privileged User Access: • CSP must have access • Improper access -> Data Exposure • HR policies • 3rd party of a 3rd party Privilege Access Control Mitigation: – Support to HR and data policies – Outsourcing involved? – Evaluate the access controls 17 GTS - 14 17 17 Copyright iDefense 2009
  • 18. Risks Data Segregation: • Shared common resources • Multiple consumers, same physical machine • Failure to segregate data: data exposure, loss or corruption 18 GTS - 14 18 18 Copyright iDefense 2009
  • 19. Risks Data Segregation: • Shared common resources • Multiple consumers, same physical machine • Failure to segregate data: data exposure, loss or corruption 19 GTS - 14 19 19 Copyright iDefense 2009
  • 20. Risks Data Segregation: • Shared common resources • Multiple consumers, same physical machine • Failure to segregate data: data exposure, loss or corruption 20 GTS - 14 20 20 Copyright iDefense 2009
  • 21. Mitigation Data Segregation: • Shared common resources • Multiple consumers, same physical machine • Failure to segregate data: data exposure, loss or corruption Data Segregation Mitigation: – What’s the risk of data segregation failure? – Encryption of data: shifting of risks – Understand the “how, where, when” of consumer data storage 21 GTS - 14 21 21 Copyright iDefense 2009
  • 22. Risks Regulatory Compliance: – Regulations for sensitive information and outsourcing – Conflicting regulations and laws – Failure to comply: significant legal risks 22 GTS - 14 22 22 Copyright iDefense 2009
  • 23. Mitigation Regulatory Compliance: – Regulations for sensitive information and outsourcing – Conflicting regulations and laws – Failure to comply: significant legal risks Regulatory Control Mitigation: FISMA – Know your regulatory obligation HIPAA – Know your CSP’s regulatory obligations SOX PCI – Understand your liabilities SAS 70 – Location may change regulatory obligations Audits 23 GTS - 14 23 23 Copyright iDefense 2009
  • 24. Risks Physical Location of Data: – Location, location, location – Location tied to regulatory issues – Volatile regions introduce a higher degree of risk – Hostile/Unethical governments have unforeseen risk of data exposure 24 GTS - 14 24 24 Copyright iDefense 2009
  • 25. Risks Physical Location of Data: – Location, location, location – Location tied to regulatory issues – Volatile regions introduce a higher degree of risk – Hostile/Unethical governments have unforeseen risk of data exposure 10/9/09 SA pigeon 'faster than broadband' BBC News Cyber A Durban IT company pitted an 11-month- old bird armed with a 4GB memory stick against the ADSL service from the country's biggest web firm, Telkom. Winston the pigeon took two hours to carry the data 60 miles - in the same time the ADSL had sent 4% of the data. computers. 25 GTS - 14 25 25 Copyright iDefense 2009
  • 26. Mitigation Physical Location of Data: – Location, location, location – Location tied to regulatory issues – Volatile regions introduce a higher degree of risk – Hostile/Unethical governments have unforeseen risk of data exposure Physical Location of Data Mitigation: – Identify your data’s location – Avoid CSPs that cannot guarantee the location – Avoid CSPs that use data centers in hostile countries – Use CSPs that reside in consumer’s country 26 GTS - 14 26 26 Copyright iDefense 2009
  • 27. Risks Availability: – Constant connectivity required – Any failure terminating connectivity is a risk – Data loss and downtime risks 27 GTS - 14 27 27 Copyright iDefense 2009
  • 28. Risks Availability: – Constant connectivity required – Any failure terminating connectivity is a risk – Data loss and downtime risks 28 GTS - 14 28 28 Copyright iDefense 2009
  • 29. Mitigation Service Availability Mitigation: – Availability is the greatest risk ! – Understand the CSP’s infrastructure: avoid single points of failure – Private clouds may reduce the availability risk, but introduce additional cost and overhead – Establish service-level agreements (SLAs) with their CSPs – Balance the risk introduced by using multiple data centers with the risk of a single site failure – Assume at least one outage, what’s the impact to you? 29 GTS - 14 29 29 Copyright iDefense 2009
  • 30. Risks Recovery: – Improper backups or system failure – The more data, more data loss risk – Recovery time is operational downtime 30 GTS - 14 30 30 Copyright iDefense 2009
  • 31. Mitigation Recovery: – Improper backups or system failure – The more data, more data loss risk – Recovery time is operational downtime Recovery Mitigation: – Understand backed up systems (Encrypted? Multiple sites?) – Identify the time required to completely recover data – Practice a full recovery to test the CSP’s response time 31 GTS - 14 31 31 Copyright iDefense 2009
  • 32. Risks Investigative Support: – Multiple consumers, aggregated logs – CSPs may hinder incident responses – Uncooperative CSPs: lost forensic data and investigation hindrances 32 GTS - 14 32 32 Copyright iDefense 2009
  • 33. Mitigation Investigative Support: – Multiple consumers, aggregated logs – CSPs may hinder incident responses – Uncooperative CSPs: lost forensic data and investigation hindrances Investigative Support Mitigation: – Establish policies and procedures with the CSP – Avoid CSPs unwilling to participate in incident 33 GTS - 14 33 33 Copyright iDefense 2009
  • 34. Risks Viability and Longevity: – CSP failure can occur at any time, for any reason – Risk of data loss and operational downtime – Large companies sometimes terminate services – Abrupt shutdowns are a more significant risk 34 GTS - 14 34 34 Copyright iDefense 2009
  • 35. Mitigation Viability and Longevity: – CSP failure can occur at any time, for any reason – Risk of data loss and operational downtime – Large companies sometimes terminate services – Abrupt shutdowns are a more significant risk Viability and Longevity Mitigation: – Understand the way a CSP can “going dark” – Have a secondary CSP in mind – Review the history and financial stability of any CSP prior to engaging 35 GTS - 14 35 35 Copyright iDefense 2009
  • 36. Cloud Computing for Malicious Intent 36 GTS - 14 36 Copyright iDefense 2009
  • 37. Malicious use source: sxc.hu Bad guys are already using such technology ;) – Botnets – Hacking as a Service, SPAM 37 GTS - 14 37 37 Copyright iDefense 2009
  • 38. Malicious use source: sxc.hu Bad guys are already using such technology – Botnets – Hacking as a Service, SPAM 11/9/09 Bot herders hide master control channel in Google cloud by Dan Goodin, The Register Cyber criminals' love affair with cloud computing Malicious use of Cloud Services just got steamier with the discovery that Google's AppEngine was tapped to act as the master control channel that feeds commands to large – C&C Server on the cloud networks of infected computers. – Storage of malicious data – Cracking passwords 38 GTS - 14 38 38 Copyright iDefense 2009
  • 39. Conclusion 39 GTS - 14 39 Copyright iDefense 2009
  • 40. Conclusions Understanding the risk of cloud-based solutions Understand the level of sensitivity of your data Perform due diligence when evaluating a CSP Identify the location of your data Get assurance that your data will remain where it is placed. Cloud computing is a new technology still experiencing growing pains. Enterprises must be aware of this and anticipate the risks the technology introduces. 40 GTS - 14 40 40 Copyright iDefense 2009
  • 41. Additional Reading Cloud Security Alliance (CSA): “Security Guidance for Critical Areas of Focus in Cloud Computing” http://www.cloudsecurityalliance.org/guidance/csaguide.pdf NIST Cloud Computing Project http://csrc.nist.gov/groups/SNS/cloud-computing/index.html ENISA report on “Cloud Computing: Benefits, risks and recommendations for information security” http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk- assessment iDefense Topical Research Paper: “Cloud Computing” 41 GTS - 14 41 41 Copyright iDefense 2009
  • 42. Q&A GTS - 14 42 Copyright iDefense 2009
  • 43. Thank You Anchises M. G. de Paula iDefense Intelligence Analyst 43