SlideShare a Scribd company logo
1 of 27
Cloud EssentialsCloud Essentials
Benefits, Risks and ControlsBenefits, Risks and Controls
 How many of you are using Cloud Services at your
organization?
 How many of you are planning / evaluating Cloud
Solutions?
 How many of you are Cloud Service Providers?
07/29/13 Global Success Systems FZ LLC 2
Lighter side of Cloud
07/29/13 Global Success Systems FZ LLC 3
Lighter side of Cloud
07/29/13 Global Success Systems FZ LLC 4
Lighter side of Cloud
07/29/13 Global Success Systems FZ LLC 5
Agenda
07/29/13 Global Success Systems FZ LLC 6
Some Predictions
“By 2020 more than a third of the Digital Universe will either
live in or pass through the cloud.” -- IDC, May 2010
“Four out of every five new commercial enterprise applications
are deployed on cloud platforms, according to industry
research, and more than half of Global 1000 companies will
store customer-sensitive data in the public cloud by the end
of 2016.” - Dimensional Research for Host Analytics
(DRHA)
“Cloud delivery has increased by 33.6% year on year for 2012 in
UAE ” – IDC Jan 2013
 c
07/29/13 Global Success Systems FZ LLC 7
What is Cloud ?
“Cloud computing, method of running application
software and storing related data in central computer
systems and providing customers or other users
access to them through the Internet”.
Encyclopedia Britannica (eb.com, 2012)
07/29/13 Global Success Systems FZ LLC 8Image Copyright EXIN
What is Cloud ?
“Cloud computing, is a model for enabling convenient, on-
demand network access to a shared pool of configurable
computing resources, that can be rapidly provisioned and
released with minimum management effort or service provider
interaction”- NIST
07/29/13 Global Success Systems FZ LLC 9Image Copyright EXIN
Cloud Computing is About
07/29/13 Global Success Systems FZ LLC 10
5 Characteristics
Service Models
Deployment
Models
Image Copyright NIST
Cloud Benefits
 Reduced Cost (the pay-per-use, economics of scale)
 Automated (updates, security patches, backups,…)
 On demand (Flexibility + Scalability = Elasticity)
 More Mobility ( "any time, any place, any device”)
 Shared Resources (multi-tenancy)
 Back to core business
“Everything gets faster, cheaper, more flexible by using Cloud”
- Werner Vogets CTO, Amazon
07/29/13 Global Success Systems FZ LLC 11
Recommendations to Adopt
Cloud
Business drivers
 Flexibility & Time to market (TTM)
 Costs
 Capex vs. Opex
 TCO for 3 to 5 Year & ROI
 Operational Beneift , Support Cost
 Service Level Agreements (SLA)
 Service Performance
 Easy to navigate
 Transaction posting time
 Quality of Service
 Support SLA ( Incidents, problems)
 Architecture - Integration (PaaS), migration
 Green(er) computing
07/29/13 Global Success Systems FZ LLC 13
Compliance and Governance
Understand the providers capabilities and compliances
 Data Center Certifications
 Average uptime
 Regulations & international standards
 Multiple sites and locations
 Backup mechanisms & Data storage
 Provider’s Supplier Details
 High security components like firewalls, a DMZ and internet security
software
 4 Ps of Service Management (People, Process, Products & Partners)
 Have a clear SLA
07/29/13 Global Success Systems FZ LLC 14
Try before you Buy
 Demand a Trail Period and TEST Thoroughly
 Don’t commit untill the service works the way you want
 Have a Road Map for your Cloud Adoption
07/29/13 Global Success Systems FZ LLC 15
Risks Management
Organizational Risk
 Difficulty knowing where data is stored
 Technical failures that could destroy the stored data
 Unauthorized access of data by others
 Failure of Cloud Service due to New Technology, Competitors,
Lack of Financial Support
 Issues around data retrieval if a cloud provider goes out of
business
 Vendor Lock-In
07/29/13 Global Success Systems FZ LLC 17
Risk Management
 Validation of credentials
 Active monitoring of traffic
 Strong authentication
 Good SLAs and Audit
 Operations procedures
 Operational security practices
 Consult a lawyer, specialized in international
legislation
 Staff vetting, etc.
07/29/13 Global Success Systems FZ LLC 18
Cloud Controls and Auditing
Personal Identifiable Information (PII)
 Forms of identification: SSN, passport, fingerprints
 Occupational: job title, company name
 Financial: bank numbers, credit records
 Health care: insurance, genetic
 Online activity: log-ins
 Demographic: ethnicity
 Contact: phone, e-mail
PII Standards
 The Privacy Act 1974, federal laws HIPAA & GLBA and Safe
harbor - USA
 Personal Information Protection Law and Law for Protection
of Computer Processed Data Held by Administrative Organs
(1988) – Japan
 PIPEDA (Personal Information Protection and Electronic Data
Act 2008) and Privacy Act (1983) – Canada
 Laws and privacy standards of the member countries, EU
Internet Privacy Law (DIRECTIVE 2002/58/EC, 2002) and EU
Data Protection Directive (1998) - EU
07/29/13 Global Success Systems FZ LLC 21
Cloud Controls Matrix (CCM)
Controls baselined and mapped to:
COBIT BITS Shared Assessments
HIPAA/HITECH Act Jericho Forum
ISO/IEC 27001-2005 NERC CIP
NISTSP800-53
PCI DSSv2.0
22
© 2011 Cloud Security Alliance, Inc. All rights reserved.
Cloud Controls Matrix (CCM)
First ever baseline control framework specifically designed for managing risk
in the Cloud Supply Chain
23
© 2011 Cloud Security Alliance, Inc. All rights reserved.
1. Compliance (CO)
2. Data Governance (DG)
3. Facility Security (FS)
4. Human Resources (HR)
5. Information Security (IS)
6. Legal (LG)
7. Operations Management (OM)
8. Risk Management (RI)
9. Release Management (RM)
10. Resiliency (RS)
11.Security Architecture (SA)
CCM – 98 Controls
© 2011 Cloud Security Alliance, Inc. All rights reserved.
Auditing Cloud
Types of Audits you need to consider
 Regulatory compliance audit
 Disaster Recovery/Business Continuity (DR/BC)
 Security audit
 Performance and Reliability audit (SLA)
 Benefit Realization audit (ROI)
07/29/13 Global Success Systems FZ LLC 25
Summary
 Understand your business needs
 Have a clear road map for Cloud Adoption
 Understand provider’s capability and regulations
 Pilot the cloud solution and ensure it is meeting
your business needs
 Have good control , monitoring and auditing
mechanism
 Enjoy the benefit of Cloud Opportunities
07/29/13 Global Success Systems FZ LLC 26
Thank you
Questions ?
Sreechith Radhakrishnan
Email : sreechith@gssgrouponline.com
Linked In : www.linkedin.com/in/sreechith
Web : www.gssgrouponline.com
07/29/13 Global Success Systems FZ LLC 27

More Related Content

What's hot

Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityCloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityJohn Rhoton
 
Cyber-insurance and liability caps proposed as incentives by Department of Co...
Cyber-insurance and liability caps proposed as incentives by Department of Co...Cyber-insurance and liability caps proposed as incentives by Department of Co...
Cyber-insurance and liability caps proposed as incentives by Department of Co...David Sweigert
 
Liquidax Patent Insights: Fog Networks (Cisco, IBM, Microsoft)
Liquidax Patent Insights:  Fog Networks (Cisco, IBM, Microsoft)Liquidax Patent Insights:  Fog Networks (Cisco, IBM, Microsoft)
Liquidax Patent Insights: Fog Networks (Cisco, IBM, Microsoft)Liquidax Capital
 
Itamg Power Point Presentation0310
Itamg Power Point Presentation0310Itamg Power Point Presentation0310
Itamg Power Point Presentation0310ITAMG
 
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...DATUM LLC
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseNextLabs, Inc.
 
Security on distributed systems cloud security versus traditional it
Security on distributed systems cloud security versus traditional itSecurity on distributed systems cloud security versus traditional it
Security on distributed systems cloud security versus traditional itieeepondy
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture IJECEIAES
 

What's hot (9)

Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityCloud Computing: New Approaches for Security
Cloud Computing: New Approaches for Security
 
Cyber-insurance and liability caps proposed as incentives by Department of Co...
Cyber-insurance and liability caps proposed as incentives by Department of Co...Cyber-insurance and liability caps proposed as incentives by Department of Co...
Cyber-insurance and liability caps proposed as incentives by Department of Co...
 
Liquidax Patent Insights: Fog Networks (Cisco, IBM, Microsoft)
Liquidax Patent Insights:  Fog Networks (Cisco, IBM, Microsoft)Liquidax Patent Insights:  Fog Networks (Cisco, IBM, Microsoft)
Liquidax Patent Insights: Fog Networks (Cisco, IBM, Microsoft)
 
Itamg Power Point Presentation0310
Itamg Power Point Presentation0310Itamg Power Point Presentation0310
Itamg Power Point Presentation0310
 
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended Enterprise
 
Security on distributed systems cloud security versus traditional it
Security on distributed systems cloud security versus traditional itSecurity on distributed systems cloud security versus traditional it
Security on distributed systems cloud security versus traditional it
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 

Viewers also liked

Composite Images Presentation
Composite Images PresentationComposite Images Presentation
Composite Images PresentationJames Brown
 
CJUSD Instructional Coaching Model
CJUSD Instructional Coaching ModelCJUSD Instructional Coaching Model
CJUSD Instructional Coaching ModelJames Brown
 
Global Success Systems Service Catalogue Ver 1.0
Global Success Systems  Service Catalogue Ver 1.0Global Success Systems  Service Catalogue Ver 1.0
Global Success Systems Service Catalogue Ver 1.0Sreechith Radhakrishnan
 
Continuous Integration for IOS Apps
Continuous Integration for IOS AppsContinuous Integration for IOS Apps
Continuous Integration for IOS AppsAllan Davis
 
Mobilecity:Android Introduction
Mobilecity:Android IntroductionMobilecity:Android Introduction
Mobilecity:Android IntroductionAllan Davis
 
MobileCity:Core Data
MobileCity:Core DataMobileCity:Core Data
MobileCity:Core DataAllan Davis
 
ICT Literacy Report and Plan
ICT Literacy Report and PlanICT Literacy Report and Plan
ICT Literacy Report and PlanJames Brown
 
The Blue Jay by Kylie
The Blue Jay by KylieThe Blue Jay by Kylie
The Blue Jay by KyliePS99
 
One Shot Short Introduction
One Shot Short IntroductionOne Shot Short Introduction
One Shot Short IntroductionJames Brown
 
The perfect shot
The perfect shotThe perfect shot
The perfect shotJames Brown
 
Four Black Squares Design Concepts
Four Black Squares Design ConceptsFour Black Squares Design Concepts
Four Black Squares Design ConceptsJames Brown
 
Why people resist change? Presented @ ISACA UAE Chapter
Why people resist  change? Presented @ ISACA UAE ChapterWhy people resist  change? Presented @ ISACA UAE Chapter
Why people resist change? Presented @ ISACA UAE ChapterSreechith Radhakrishnan
 
Parts of a Script
Parts of a ScriptParts of a Script
Parts of a ScriptJames Brown
 

Viewers also liked (18)

5 essential-facts-about-cobit
5 essential-facts-about-cobit5 essential-facts-about-cobit
5 essential-facts-about-cobit
 
Composite Images Presentation
Composite Images PresentationComposite Images Presentation
Composite Images Presentation
 
CJUSD Instructional Coaching Model
CJUSD Instructional Coaching ModelCJUSD Instructional Coaching Model
CJUSD Instructional Coaching Model
 
Idea Mapping
Idea MappingIdea Mapping
Idea Mapping
 
Global Success Systems Service Catalogue Ver 1.0
Global Success Systems  Service Catalogue Ver 1.0Global Success Systems  Service Catalogue Ver 1.0
Global Success Systems Service Catalogue Ver 1.0
 
prueba
pruebaprueba
prueba
 
Continuous Integration for IOS Apps
Continuous Integration for IOS AppsContinuous Integration for IOS Apps
Continuous Integration for IOS Apps
 
Mobilecity:Android Introduction
Mobilecity:Android IntroductionMobilecity:Android Introduction
Mobilecity:Android Introduction
 
MobileCity:Core Data
MobileCity:Core DataMobileCity:Core Data
MobileCity:Core Data
 
How to improve your results - Webinar
How to improve your results - WebinarHow to improve your results - Webinar
How to improve your results - Webinar
 
ICT Literacy Report and Plan
ICT Literacy Report and PlanICT Literacy Report and Plan
ICT Literacy Report and Plan
 
Introduction to cobit 5.0
Introduction to cobit 5.0Introduction to cobit 5.0
Introduction to cobit 5.0
 
The Blue Jay by Kylie
The Blue Jay by KylieThe Blue Jay by Kylie
The Blue Jay by Kylie
 
One Shot Short Introduction
One Shot Short IntroductionOne Shot Short Introduction
One Shot Short Introduction
 
The perfect shot
The perfect shotThe perfect shot
The perfect shot
 
Four Black Squares Design Concepts
Four Black Squares Design ConceptsFour Black Squares Design Concepts
Four Black Squares Design Concepts
 
Why people resist change? Presented @ ISACA UAE Chapter
Why people resist  change? Presented @ ISACA UAE ChapterWhy people resist  change? Presented @ ISACA UAE Chapter
Why people resist change? Presented @ ISACA UAE Chapter
 
Parts of a Script
Parts of a ScriptParts of a Script
Parts of a Script
 

Similar to Cloud Essentials - ISACA CPE Meeting

How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is CloudWilliam Lam
 
Pinning Down Cloud Computing
Pinning Down Cloud ComputingPinning Down Cloud Computing
Pinning Down Cloud ComputingYankee Group
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
MajorProject_AnilSharma
MajorProject_AnilSharmaMajorProject_AnilSharma
MajorProject_AnilSharmaAnil Sharma
 
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...IJECEIAES
 
Cw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerCw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerinevitablecloud
 
Cognizant Cloud for Utilities
Cognizant Cloud for UtilitiesCognizant Cloud for Utilities
Cognizant Cloud for UtilitiesSteve Lennon
 
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesHugo Rodrigues
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
Cisco IoT World Forum 2014: Airwatch Breakout Session
Cisco IoT World Forum 2014: Airwatch Breakout SessionCisco IoT World Forum 2014: Airwatch Breakout Session
Cisco IoT World Forum 2014: Airwatch Breakout SessionBasil Hashem
 
Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Mark Skilton
 
IBM Cloud Computing (Steven Deskovic)
IBM Cloud Computing (Steven Deskovic)IBM Cloud Computing (Steven Deskovic)
IBM Cloud Computing (Steven Deskovic)Ростелеком
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing IntroductionMzos Pune
 
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...HCL Infosystems
 
The Changing Data Quality & Data Governance Landscape
The Changing Data Quality & Data Governance LandscapeThe Changing Data Quality & Data Governance Landscape
The Changing Data Quality & Data Governance LandscapeTrillium Software
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computingRohit Jayale
 
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...SLA-Ready Network
 
IEEE PHM Cloud Computing
IEEE PHM Cloud ComputingIEEE PHM Cloud Computing
IEEE PHM Cloud ComputingJoseph Williams
 

Similar to Cloud Essentials - ISACA CPE Meeting (20)

How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
 
Pinning Down Cloud Computing
Pinning Down Cloud ComputingPinning Down Cloud Computing
Pinning Down Cloud Computing
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
MajorProject_AnilSharma
MajorProject_AnilSharmaMajorProject_AnilSharma
MajorProject_AnilSharma
 
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
 
Cw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerCw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamer
 
Cognizant Cloud for Utilities
Cognizant Cloud for UtilitiesCognizant Cloud for Utilities
Cognizant Cloud for Utilities
 
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud Services
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Cisco IoT World Forum 2014: Airwatch Breakout Session
Cisco IoT World Forum 2014: Airwatch Breakout SessionCisco IoT World Forum 2014: Airwatch Breakout Session
Cisco IoT World Forum 2014: Airwatch Breakout Session
 
Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...
 
IBM Cloud Computing (Steven Deskovic)
IBM Cloud Computing (Steven Deskovic)IBM Cloud Computing (Steven Deskovic)
IBM Cloud Computing (Steven Deskovic)
 
Cloud security v2
Cloud security v2Cloud security v2
Cloud security v2
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
 
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
 
The Changing Data Quality & Data Governance Landscape
The Changing Data Quality & Data Governance LandscapeThe Changing Data Quality & Data Governance Landscape
The Changing Data Quality & Data Governance Landscape
 
IBM Z for the Digital Enterprise 2018 - Z Keynote
IBM Z for the Digital Enterprise 2018 - Z KeynoteIBM Z for the Digital Enterprise 2018 - Z Keynote
IBM Z for the Digital Enterprise 2018 - Z Keynote
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computing
 
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
 
IEEE PHM Cloud Computing
IEEE PHM Cloud ComputingIEEE PHM Cloud Computing
IEEE PHM Cloud Computing
 

Recently uploaded

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 

Recently uploaded (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 

Cloud Essentials - ISACA CPE Meeting

  • 1. Cloud EssentialsCloud Essentials Benefits, Risks and ControlsBenefits, Risks and Controls
  • 2.  How many of you are using Cloud Services at your organization?  How many of you are planning / evaluating Cloud Solutions?  How many of you are Cloud Service Providers? 07/29/13 Global Success Systems FZ LLC 2
  • 3. Lighter side of Cloud 07/29/13 Global Success Systems FZ LLC 3
  • 4. Lighter side of Cloud 07/29/13 Global Success Systems FZ LLC 4
  • 5. Lighter side of Cloud 07/29/13 Global Success Systems FZ LLC 5
  • 7. Some Predictions “By 2020 more than a third of the Digital Universe will either live in or pass through the cloud.” -- IDC, May 2010 “Four out of every five new commercial enterprise applications are deployed on cloud platforms, according to industry research, and more than half of Global 1000 companies will store customer-sensitive data in the public cloud by the end of 2016.” - Dimensional Research for Host Analytics (DRHA) “Cloud delivery has increased by 33.6% year on year for 2012 in UAE ” – IDC Jan 2013  c 07/29/13 Global Success Systems FZ LLC 7
  • 8. What is Cloud ? “Cloud computing, method of running application software and storing related data in central computer systems and providing customers or other users access to them through the Internet”. Encyclopedia Britannica (eb.com, 2012) 07/29/13 Global Success Systems FZ LLC 8Image Copyright EXIN
  • 9. What is Cloud ? “Cloud computing, is a model for enabling convenient, on- demand network access to a shared pool of configurable computing resources, that can be rapidly provisioned and released with minimum management effort or service provider interaction”- NIST 07/29/13 Global Success Systems FZ LLC 9Image Copyright EXIN
  • 10. Cloud Computing is About 07/29/13 Global Success Systems FZ LLC 10 5 Characteristics Service Models Deployment Models Image Copyright NIST
  • 11. Cloud Benefits  Reduced Cost (the pay-per-use, economics of scale)  Automated (updates, security patches, backups,…)  On demand (Flexibility + Scalability = Elasticity)  More Mobility ( "any time, any place, any device”)  Shared Resources (multi-tenancy)  Back to core business “Everything gets faster, cheaper, more flexible by using Cloud” - Werner Vogets CTO, Amazon 07/29/13 Global Success Systems FZ LLC 11
  • 13. Business drivers  Flexibility & Time to market (TTM)  Costs  Capex vs. Opex  TCO for 3 to 5 Year & ROI  Operational Beneift , Support Cost  Service Level Agreements (SLA)  Service Performance  Easy to navigate  Transaction posting time  Quality of Service  Support SLA ( Incidents, problems)  Architecture - Integration (PaaS), migration  Green(er) computing 07/29/13 Global Success Systems FZ LLC 13
  • 14. Compliance and Governance Understand the providers capabilities and compliances  Data Center Certifications  Average uptime  Regulations & international standards  Multiple sites and locations  Backup mechanisms & Data storage  Provider’s Supplier Details  High security components like firewalls, a DMZ and internet security software  4 Ps of Service Management (People, Process, Products & Partners)  Have a clear SLA 07/29/13 Global Success Systems FZ LLC 14
  • 15. Try before you Buy  Demand a Trail Period and TEST Thoroughly  Don’t commit untill the service works the way you want  Have a Road Map for your Cloud Adoption 07/29/13 Global Success Systems FZ LLC 15
  • 17. Organizational Risk  Difficulty knowing where data is stored  Technical failures that could destroy the stored data  Unauthorized access of data by others  Failure of Cloud Service due to New Technology, Competitors, Lack of Financial Support  Issues around data retrieval if a cloud provider goes out of business  Vendor Lock-In 07/29/13 Global Success Systems FZ LLC 17
  • 18. Risk Management  Validation of credentials  Active monitoring of traffic  Strong authentication  Good SLAs and Audit  Operations procedures  Operational security practices  Consult a lawyer, specialized in international legislation  Staff vetting, etc. 07/29/13 Global Success Systems FZ LLC 18
  • 19. Cloud Controls and Auditing
  • 20. Personal Identifiable Information (PII)  Forms of identification: SSN, passport, fingerprints  Occupational: job title, company name  Financial: bank numbers, credit records  Health care: insurance, genetic  Online activity: log-ins  Demographic: ethnicity  Contact: phone, e-mail
  • 21. PII Standards  The Privacy Act 1974, federal laws HIPAA & GLBA and Safe harbor - USA  Personal Information Protection Law and Law for Protection of Computer Processed Data Held by Administrative Organs (1988) – Japan  PIPEDA (Personal Information Protection and Electronic Data Act 2008) and Privacy Act (1983) – Canada  Laws and privacy standards of the member countries, EU Internet Privacy Law (DIRECTIVE 2002/58/EC, 2002) and EU Data Protection Directive (1998) - EU 07/29/13 Global Success Systems FZ LLC 21
  • 22. Cloud Controls Matrix (CCM) Controls baselined and mapped to: COBIT BITS Shared Assessments HIPAA/HITECH Act Jericho Forum ISO/IEC 27001-2005 NERC CIP NISTSP800-53 PCI DSSv2.0 22 © 2011 Cloud Security Alliance, Inc. All rights reserved.
  • 23. Cloud Controls Matrix (CCM) First ever baseline control framework specifically designed for managing risk in the Cloud Supply Chain 23 © 2011 Cloud Security Alliance, Inc. All rights reserved. 1. Compliance (CO) 2. Data Governance (DG) 3. Facility Security (FS) 4. Human Resources (HR) 5. Information Security (IS) 6. Legal (LG) 7. Operations Management (OM) 8. Risk Management (RI) 9. Release Management (RM) 10. Resiliency (RS) 11.Security Architecture (SA)
  • 24. CCM – 98 Controls © 2011 Cloud Security Alliance, Inc. All rights reserved.
  • 25. Auditing Cloud Types of Audits you need to consider  Regulatory compliance audit  Disaster Recovery/Business Continuity (DR/BC)  Security audit  Performance and Reliability audit (SLA)  Benefit Realization audit (ROI) 07/29/13 Global Success Systems FZ LLC 25
  • 26. Summary  Understand your business needs  Have a clear road map for Cloud Adoption  Understand provider’s capability and regulations  Pilot the cloud solution and ensure it is meeting your business needs  Have good control , monitoring and auditing mechanism  Enjoy the benefit of Cloud Opportunities 07/29/13 Global Success Systems FZ LLC 26
  • 27. Thank you Questions ? Sreechith Radhakrishnan Email : sreechith@gssgrouponline.com Linked In : www.linkedin.com/in/sreechith Web : www.gssgrouponline.com 07/29/13 Global Success Systems FZ LLC 27

Editor's Notes

  1. © Property of Learning Lake All rights reserved
  2. © Property of Learning Lake All rights reserved
  3. © Property of Learning Lake All rights reserved
  4. © Property of Learning Lake All rights reserved
  5. © Property of Learning Lake All rights reserved
  6. © Property of Learning Lake All rights reserved
  7. © Property of Learning Lake All rights reserved
  8. © Property of Learning Lake All rights reserved
  9. © Property of Learning Lake All rights reserved
  10. © Property of Learning Lake All rights reserved
  11. © Property of Learning Lake All rights reserved
  12. © Property of Learning Lake All rights reserved
  13. © Property of Learning Lake All rights reserved
  14. © Property of Learning Lake All rights reserved
  15. Start consolidating servers, storage, networks and IT resources Virtulizing the technology resources, including applications Organize your IT Offering as Business Services Structure IT as a Shared service Organization Prepare your Organization ( Change Management) © Property of Learning Lake All rights reserved
  16. © Property of Learning Lake All rights reserved
  17. © Property of Learning Lake All rights reserved
  18. Effective Access Control and Audit Single Sign On (SSO) Strong authentication: password & biometric measure Review on audit logs Secure Cloud Storage Encryption Integrity by mechanisms as hashing Secure Network Infrastructure Encryption protocols against leakage Integrity protocols (digital signatures) against modification Consult a lawyer, specialized in international legislation Know where (which country) your data is © Property of Learning Lake All rights reserved
  19. © Property of Learning Lake All rights reserved
  20. © Property of Learning Lake All rights reserved
  21. Optimal and holistic compliance addresses the inter and intra-organizational challenges of persistent information security by clearly delineating control ownership.
  22. © Property of Learning Lake All rights reserved
  23. © Property of Learning Lake All rights reserved
  24. © Property of Learning Lake All rights reserved