A Comprehensive Overview of Secure Cloud Computing: November, 2012
A Comprehensive Overview of Secure Cloud Computing: November, 2012
Bhavani Thuraisingham
November, 2012
A Comprehensive Overview of
Secure Cloud Computing
Outline
$riva"
!eurit" as a !ervie
Diretions
Definition
!$I -rame)or.
Deplo"ment #odel
(e" Drivers
Impat
/overnane
Barriers
Definition of Cloud Computing
#assive salabilit"
1lastiit"
$a" as "ou go
!eurit" is a onsideration
Customi6ed appliations
Cloud Services Deliver" !odel
!aa!
-
&ents soft)are on a subsription basis
-
!ervie inludes soft)are, hard)are and support
-
7sers aess the servie through authori6ed devie
-
!uitable for a ompan" to outsoure hosting of apps
$aa!
-
5endor offers development environment to appliation
developers
-
$rovide develops tool.its, building blo.s, pa"ment
hoo.s
Iaa!
-
$roessing po)er and storage servie
-
4"pervisor is at this level
Deplo"ment !odels
$ubli Clouds
-
4osted, operated and managed b" third part" vendor
-
!eurit" and da" to da" management b" the vendor
$rivate Clouds
-
Net)or.s, infrastrutures, data enters o)ned b" the
organi6ation
4"brid Clouds
-
!ensitive appliations in a private loud and non sensitive
appliations in a publi loud
#e" Drivers
1onomies of sale
+pen standards
!ustainabilit"
Impact
Individual Customers
Individual Businesses
!tart0ups
*arge businesses
$overnance
-or !aa! model all la"ers are ontrolled b" the vendor
-or the Iaa! model, %pps are ontrolled b" the organi6ation,
!ervies ontrolled b" both )hile the net)or., storage and
server ontrolled b" the vendor
-or $aa!, %pps and !ervies are ontrolled b" both )hile
servers, storage and net)or. ontrolled b" the vendor
%arriers
!eurit"
$riva"
&eliabilit"
Interoperabilit"
1onomi value
I& governane
Changes in IT organi6ation
$olitial issues
Cloud Computing Infrastructure Securit"
4"pervisor seurit"
!eurit" for
-
Data in transit
-
Data at rest
-
$roessing of data inluding multitenan"
-
Data *ineage
-
Data $rovenane
-
Data remnane
#itigation
-
!ensitive data annot be stored in a publi loud
-
4omomorphi enr"ption ma" be a solution in the future
Provider Data and its Securit"
What data does the provider ollet < e.g., metadata, and ho)
an this data be seured8
Wh" I%#8
I%# hallenges
I%# definitions
%uthentiation
-
5erif"ing the identit" of a user, s"stem or servie
%uthori6ation
-
$rivileges that a user or s"stem or servie has after being
authentiated 2e.g., aess ontrol3
%uditing
-
1:am )hat the user, s"stem or servie has arried out
-
Che. for ompliane
IA! Practice
%vailabilit" #anagement
%ess Control
!aa! availabilit"
-
Customer responsibilit"' Customer must understand !*%
and ommuniation methods
-
!aa! health monitoring
$aa! availabilit"
-
Customer responsibilit"
-
E$aa! health monitoring
Iaa! availabilit"
-
Customer responsibilit"
-
Iaa! health monitoring
Access Control !anagement in the Cloud
%ess
Compliane
!torage
&etention
Destrution
$riva" Breahes
Who is +esponsi.le for Privac"
!eurit" $riniple
Transfer $riniple
%ountabFlit" $riniple
'egal and +egulator" +e0uirements
7! &egulations
-
-ederal &ules of Civil $roedure
-
7! $atriot %t
-
1letroni Communiations $riva" %t
-
-I!#%
-
/*B%
-
4I$%%
-
4IT1C4 %t
International regulations
-
17 Diretive
-
%$1C $riva" -rame)or.
Audit and Compliance
Control +b=etives
&egulator"B1:ternal Compliane
Defines !trateg"
Define $oliies
+ngoing operations
+ngoing monitoring
Continuous improvement
$overnance, +isk and Compliance
&is. assessment
#onitoring
&eporting
Continuous improvement
!eurit" $oli"
%sset management
%ess ontrol
Compliane
(e" #anagement
+egulator"234ternal Compliance
!arbanes0+:le" %t
$CI D!!
4I$%%
C+BIT
+b=etives inlude
-
$romote ommon level of understanding bet)een
onsumers and providers
-
$romote independent researh into best praties
-
*aunh a)areness and eduational programs
-
Create onsensus
%udit -rame)or.
-
!%! D0
-
!"sTrust
-
WebTrust
-
I!+ 2D001 ertifiation
&elevane to Cloud
Cloud Service Providers
&ight!ale 2!aa!3
Wor.da" 2!aa!3
Securit" as a Service
1mail -iltering
5ulnerabilit" #anagement
Identit" #anagement
Impact of Cloud Computing
Benefits
-
*o) ost solution
-
&esponsiveness fle:ibilit"
-
IT 1:pense marhes Transation volume
-
Business users are in diret ontrol of tehnolog"
deisions
-
*ine bet)een home omputing appliations and
enterprise appliations )ill blur
Threats
-
5ested interest of loud providers
-
*ess ontrol over the use of tehnologies
-
$ereived ris. of using loud omputing
-
$ortabilit" and *o.0in to $roprietar" s"stems for C!$s
-
*a. of integration and omponenti6ation
Directions