Cloud Security
Cloud Security
Network
Platform as a service (PaaS)
• Provider Application development
frameworks, middleware capabilities,
and functions such as databases,
messaging, and queuing.
• Client Deploy consumer-created or
acquired applications onto cloud
infrastructure
• Created using programming languages
and tools supported by the cloud
provider
Simplified PaaS architecture
Network
Software as a Service (SaaS)
• The consumer uses the provider' s
applications.
• Doesn’t necessarily have to run on laaS or
PaaS, but must still have the Essential
Characteristics.
• The consumer does not manage or control
the underlying cloud infrastructure
including network, servers, operating
systems, storage, or even individual
application capabilities.
Simplified SaaS architecture
Summary
• Service models describe what is actually offered to a cloud consumer- infrastructure, a
platform, or a complete application (software).
• Infrastructure as a Service provides resource pools of virtualized infrastructure, such as
compute, network, or storage pools.
• Platform as a Service further abstracts capabilities and provides resource pools of pre-
configured services where the cloud consumer doesn't manage the underlying
infrastructure. Such as databases, container platforms, message queues, and a Wide
range of other services.
• Software as a Service fully abstracts everything except the application itself. Cloud
consumers use the application but have no insight or management of the underlying
resources.
• ln real-world deployments cloud consumers often mix and match the service models to
meet project requirements.
Unit 5 - Cloud Deployment Models
• Cloud Deployment Models
• Models and Responsibilities
• Hybrid Cloud
• Logical Model
Cloud Deployment Models
• Public
• The cloud infrastructure is made available to the general public or a large industry
group and is owned by an organization selling cloud services.
• This tends to be what most organizations view as the "cloud."
• Private
• The cloud infrastructure is operated solely for a single organization.
• It may be managed by the organization or a third party, and may exist on-premises (a
solution hosted in-house and usually supported by a third-party ) or off-premises (a
solution hosted by a third-party and usually supported by a different third-party).
• Any infrastructure you are responsible for managing can be termed a "private cloud.“
• There is a lot of work to be done to turn a traditional existing data center into a
private cloud facility, but it's definitely a direction many organizations are moving
towards.
Cloud Deployment Models
• Community
• specialized Community comes together and open their clouds that are
otherwise essentially private
• Hybrid
• The cloud infrastructure is a composition of two or more clouds (private,
community, or public) that remain unique entities but are bound together by
standardized or proprietary technology that enables data and application
portability
• It connects on-premise resources to public cloud deployment
• Hybrid models are real and provide both a shorter term migration plan (so you
can support your existing data centers/private cloud, while moving some or all
of your infrastructure to another cloud platform).
Cloud deployment models & responsabilities
Hybrid Cloud cloud bursting is a configuration that's set up between a private
cloud and a public cloud to deal with peaks in IT demand.
• The Iower down the stack the cloud service provider stops, the more
security capabilities and management consumers are responsible for
implementing and ma naging themselves.
Security recommendations for the two parties
• The shared responsibility model directly correlates to two recommendations:
• Cloud providers should clearly document their internal security controls and customer
security features so the cloud user can make an informed decision. Providers should
also properly design and implement those controls.
• Cloud users should, for any given cloud project, build a responsibilities matrix to
document who is implementing which controls and how. This should also align with any
necessary compliance standards.
• The Cloud Security Alliance provides two tools to help meet these
requirements:
• The Consensus Assessments Initiative Questionnaire (CAIQ). A standard template for
cloud providers to document their security and compliance controls.
• The Cloud Controls Matrix (CCM), which lists cloud security controls and maps them to
multiple security and compliance standards. The CCM can also be used to document
security responsibilities.
Cloud Security Models
• Cloud security models are tools to help guide security decisions. We break out
the following types
• Conceptual models or frameworks include visualizations and descriptions used to explain
cloud security concepts and principles, such as the CSA logical model in this document.
• Controls models or frameworks categorize and detail specific cloud security controls or
categories of controls, such as the CSA CCM.
• Reference architectures are templates for implementing cloud security, typically
generalized (e.g. an IaaS security reference architecture). They can be very abstract,
bordering on conceptual, or quite detailed, down to specific controls and functions.
• Design patterns are reusable solutions to particular problems. In security, an example is
IaaS log management. As with reference architectures, they can be more or less abstract
or specific, even down to common implementation patterns on particular cloud
platforms.
CSA recommended models
• The CSA has reviewed and recommends the following models:
• The CSA Enterprise Architecture
• The CSA Cloud Controls Matrix
• The NIST draft Cloud Computing Security Reference Architecture (NIST Special
• Publication 500-299), which includes conceptual models, reference
architectures, and a controls framework.
• ISO/IEC FDIS 27017 Information technology – Security techniques – Code of
practice for information security controls based on ISO/IEC 27002 for cloud
services
Cloud Security Considerations
• SECURITY CONSIDERATIONS BREAK DOWN TO
• How does the underlying technology affect security controls?
• Who will consume assets, resources, information?
• Who is responsible for governance, security and compliance?
A Simple Cloud Security Process Model
Module 2: Infrastructure Security for
Cloud
• Maps to the following in Guidance :
• DOMAIN 6 Management Plane Business
• DOMAIN 7 Infrastructure Security
• DOMAIN 8 Virtualization and Containers
• Covers the following subject areas:
• Securing base infrastructure
• Management plane security
• Securing virtual hosts and networks
• laaS PaaS, Saas security
Unit 2.1 - Module Intro
• Unit 1 - Module Intro
• Unit 2 - Intro to Infrastructure Security for Cloud Computing
• Unit 3 - Software Defined Networks
• Unit 4 - Cloud Network Security
• Unit 5 - Securing Compute Workloads
• Unit 6 - Management Plane Security
• Unit 7 - Business Continuity and Disaster Recovery (BCDR)
Unit 2.2 - Intro to Infrastructure Security for
Cloud Computing
• Macro Layers
• Cloud Infrastructure Security Overview
• How IaaS works
• Public vs. Private
• Simplified Infrastructure Components
• Securing Cloud infrastructure
Macro Layers
• In cloud computing there are two macro layers to
infrastructure:
• The fundamental resources pooled together to create a cloud.
This is the raw, physical and logical compute (processors,
memory, etc.), networks, and storage used to build the cloud’s
resource pools. For example, this includes the security of the
networking hardware and software used to create the network
resource pool.
• The virtual/abstracted infrastructure managed by a cloud user.
That’s the compute, network, and storage assets that they use
from the resource pools. For example, the security of the virtual
network, as defined and managed by the cloud user.
• Infrastructure security that’s more fundamental for cloud
providers, including those who manage private clouds, is
well aligned with existing security standards for data
centers.
Cloud Infrastructure Security Overview
How IaaS works
Public vs. Private
• If you run your own private cloud,
you're responsible for all of this.
• ln a public Cloud, you only control
what you consume, plus a little
management.
Simplified Infrastructure Components
• Management Plane
• Access and Credentials
• Management Plane Security process
• Root Account Security
• Cloud IAM Management
• Privileged Users
• Monitoring and Auditing
• Recommendations
Management Plane
• Cloud abstracts and centralizes administrative management of resources. Instead of
controlling a data center configuration with boxes and wires, it is now controlled
with API calls and web consoles.
• Gaining access to the management plane is like gaining unfettered access to your
data center, unless you put the proper security controls in place
• To think about it in security terms, the management plane consolidates many things
we previously managed through separate systems and tools, and then makes them
Internet-accessible with a single set of authentication credentials.
• Centralization also brings security benefits. There are no hidden resources, you
always know where everything you own is at all times, and how it is configured
• This doesn’t mean that all the assets you put into the cloud are equally managed.
The cloud controller can’t peer into running servers or open up locked files, nor
understand the implications of your specific data and information.
Access and Credentials
• KEY FUNCTIONS
• Provisioning resources
• Starting/stopping/terminating
• Configuring resources
• SECURITY CONSIDERATIONS
• Authentication
• Access Control
• Logging/Monitoring
• THE MANAGEMENT PLANE IS THE LITERAL
KEY TO YOUR PRIVATE CLOUD. PROTECT IT
WISELY.
Management Plane Access
• Web Console
• Password
• Federation
• Enable Multi-factor authentication
• API-Level Access
• Different credentials
• HTTP request signing
• Tokens
• OAuth/SAML
Always use TLS
Management Plane Access & Credentials
• Different providers / platforms use different authentication options
• We cover some of these in more depth in the identity management section
• Web console logins are typically like logging into any other web service
• Username and password
• Maybe MFA
• APIs use multiple techniques that may or may not have credentials
different from the web console
• Http request signing (crypto using keys, API key)
• Tokens
• Oauth/saml
• All connections should always use TLS
Management Plane Security process
• Secure root account
• Manage Non-Root Users
• Enable Monitoring / Auditing
Root Account Security
• Enable hardware multi-factor authentication (MFA)
• Store in a locked, central location
• Use isolated credentials (a designated email or user account not used
for anything else)
• Use a name with a random seed if possible to reduce phishing
• If available, use account security questions
• Record and store securely
• Never use account except for emergencies
Cloud IAM Management
• Role-Based Access Control (RBAC)
• Variable granularity across providers/platforms
• Variable granularity within product lines
• Look for ability to integrate w/SSO or directory services
• Investigate third-party tools
Privileged Users
• There is an account owner (or master) with super-admin
privileges to manage the entire configuration.
• This should be enterprise-owned (not personal),
tightly locked down, and nearly never used.
• Separate from the account-owner you can usually create super-admin accounts
for individual admin use.
• Use these privileges sparingly; this should also be a smaller group since compromise or
abuse of one of these accounts could allow someone to change or access essentially
everything and anything.
• Your platform or provider may support lower-level administrative accounts that
can only manage parts of the service.
• We sometimes call these “service administrators” or “day to day administrators”.
• These accounts don’t necessarily expose the entire deployment if they are abused or
compromised and thus are better for common daily usage.
Monitoring and Auditing
• CLOUD SIDE
• Logs all API and internal activity
• Best option when available
• Pull logs to secure, central location
• PORTAL / PROXY
• Route users through a portal, they don't have direct credentials
• (-) Misses internal activity or compromised creds
• May be the only option
• CASB (Cloud Access and Security Brokers) tools often used for SaaS (we
discuss later) Host / Network Logs
Recommendations
• The management plane is how you manage your cloud deployments. It's the biggest
difference from traditional infrastructure security, and the most critical piece to protect.
• Nearly all clouds support both web console and API access to the management plane.
When running your own cloud it's critical to make sure these are effectively locked down.
• Management planes support different kinds of credentials, all of which must be managed
securely.
• Always start by securing the root or master account since losing control of that means
losing complete control over your cloud deployment
• Enforce least privilege when setting up your other privileged users and administrators.
• Always use multifactor authentication for all cloud accounts, especially privileged users.
Unit 7 - Business Continuity and Disaster
Recovery (BCDR)
• Architect for Failure
• Key Aspects of Disaster Planning for Cloud
• Cover the Entire Stack
• BC/DR in the Cloud
Architect for Failure
• Cloud platforms can be incredibly resilient, but single cloud assets are typically less
resilient than in the case of traditional infrastructure. This is due to the inherently
greater fragility of virtualized resources running in highly-complex environments.
• This means that cloud providers tend to offer options to improve resiliency
• Extra resiliency is only achievable if you architect to leverage these capabilities
• “lift and shift” wholesale migration of existing applications without architectural
changes can reduce resiliency.
• The ability to manage is higher with IaaS and much lower with SaaS, just like security.
For SaaS, you rely on the cloud provider keeping the entire application service up.
• With IaaS, you can architect your application to account for failures, putting more
responsibility in your hands.
• PaaS, as usual, is in the middle.
Architect for Failure
• Rule #1 : Architect for failure !
• Design for your platform(s) and don't expect existing architectures to lift and
shift without compromise
Key Aspects of Disaster Planning for Cloud
• Ensuring continuity and recovery within a given cloud provider.
• These are the tools and techniques to best architect your cloud deployment to keep
things running if either what you deploy breaks, or a portion of the cloud provider
breaks.
• Preparing for and managing cloud provider outages.
• This extends from the more constrained problems that you can architect around
within a provider to the wider outages that take down all or some of the provider in a
way that exceeds the capabilities of inherent DR controls.
• Considering options for portability, in case you need to migrate providers or
platforms.
• This could be due to anything from desiring a different feature set to the complete loss
of the provider if, for example, they go out of business or you have a legal dispute.
Cover the Entire Stack METASTRUCTURE / MANAGEMENT PLANE
• The Cloud configuration
• IAM, monitoring, and other in-cloud
management controls and compliance
artifacts
• Software Defined Infrastructure is a key tool
INFOSTRUCTURE INFRASTRUCTURE
• Leverage "resilient" provider • Core configuration (config de base)
storage (e.g. most object • Leverage platform/provider resiliency
storage is highly resilient) capabilities rather than building from
• Keep backups/snapshots scratch inside VMs
within the provider for rapid
restore APPLISTRUCTURE
• Always use Iowest cost • Understand PaaS limitations and lock-in,
storage and transfer including the historical availability of
mechanisms within and services
between providers • Downtime is nearly always an option -
have realistic standards
• Adopt Chaos Engineering
BC/DR in the Cloud
• Architecture for failure.
• Take a risk-based approach to everything.
• Even when you assume the worst, it doesn't mean you can afford or need to keep full availability
if the worst happens.
• Design for high availability within your cloud provider.
• In IaaS and PaaS, this is often easier and more cost effective than the equivalent in
traditional infrastructure.
• Take advantage of provider-specific features.
• Understand provider history, capabilities, and limitations.
• Cross-location should always be considered, but beware of costs depending on availability
requirements.
• Also ensure things like images and asset IDs are converted to work in the different locations.
• Business continuity for metastructure is as important as that for assets.
BC/DR in the Cloud
• Prepare for graceful failure in case of a cloud provider outage.
• This can include plans for interoperability and portability with other cloud providers or a
different region with your current provider.
• For super-high-availability applications, start with cross-location BC before
attempting cross-provider BC.
• Cloud providers, including private cloud, must provide the highest levels of
availability and mechanisms for customers/users to manage aspects of their
own availability.
Risk-based approach
• Overall, a risk-based approach is key:
• Not all assets need equal continuity.
• Don’t drive yourself crazy by planning for full provider outages just because of
the perceived loss of control. Look at historical performance.
• Strive (try) to design for RTOs and RPOs equivalent to those on traditional
infrastructure.
Summary
• The first rule of cloud is to architect for failure. Since any individual virtual
resource may be less resilient, cloud provides and platforms have built in
tools to improve systemic resilience. But fail to use these and you are
more Iikely to experience an outage.
• The two major areas to focus on are resiliency within your cloud provider,
then resiliency if your provider goes down. Portability can play a role here
but don’t get so hung up on it that you become paralized and can't use all
of the capabilities of your platform or provider.
• Your BC/DR should cover the entire stack of the logical model- from the
metastructure / management plane and infrastructure to your data and
application architecture.
Module 3: Managing Cloud Security and
Risk
• Unit 1 - Module Introduction
• Unit 2 - Governance
• Unit 3 - Managing Cloud Security Risk
• Unit 4 - Compliance
• Unit 5 - Legal Issues In Cloud
• Unit 6 - Audit
• Unit 7 - CSA Tools
Unit 1 - Module Introduction
Contract
• The way you define the
relationship
• Terms of service
• Scope
• Breaches
• How you govern With
that cloud provider
From Governance to Risk
Conclusion
• Governances defines how an organization is managed.
• Contracts can extend governance and internal controls to the cloud
provider.
• The contract helps define the roles of the shared responsibilities
model.
• Supplier assessments and compliance reports help validate that the
cloud provider is meeting the expectations of the cloud consumer.
Unit 3 - Managing Cloud Security Risk
• Risk Management
• Risk Assessment
• Service Model Effects
• Deployment Model Effects
• Tradeoff Considerations
• Cloud Risk Management Tools
• Governance Risk and Considerations
Risk Management
• ENTERPRISE RISK MANAGEMENT (ERM) • INFORMATION RISK
• Rooted in providing value to stakeholders.
• How to measure, manage, and mitigate uncertainty.
MANAGEMENT
• Aligning risk management to the
• ERM is based on the shared responsibilities
model.
tolerance of the data owner.
• Primary means of decision support
• ERM relies on good contracts and documentation
to know where the division of responsibilities for IT/security on the CIA of
and potential for untreated risk lie information assets.
• For more on risk management see
• ISO 31000:2009 - Risk management – Principles and
guidelines
• ISO/IEC 31010:2009 - Risk management – Risk
assessment techniques
• [NIST Special Publication 800-37 Revision 1](updated
June 5, 2014)
Risk Assessment
• Risk tolerance is the amount of risk that the leadership and stakeholders of an
organization are willing to accept.
• It varies based on asset and you shouldn’t make a blanket risk decision about a
particular provider; rather, assessments should align with the value and
requirements of the assets involved.
• Just because a public cloud provider is external and a consumer might be
concerned with shared infrastructure for some assets doesn’t mean it isn’t within
risk tolerance for all assets.
• Practically speaking, you will build out a matrix of cloud services along with which
types of assets are allowed in those services.
• Moving to the cloud doesn’t change your risk tolerance, it just changes how risk is
managed.
Service Model Effects
Attention must be paid to how the Service and Deployment models affect the
ability to manage governance and risk
INFRASTRUCTURE AS A PLATFORM AS A SERVICE SOFTWARE ASA SERVICE (SAAS)
SERVICE (AAS) (PAAS)
• Closest to traditional data center • Less likely to have fully • most critical example of the need for a
• Most existing risk controls/activities negotiated contract negotiated contract.
will transfer • May be difficult to measure • Such a contract will protect the
• Key differences are contract compliance (SLAs) ability to govern or validate risk as it
metastructure/management plane • Much comes down to the relates to data stored, processed,
and abstraction / orchestration details of the PaaS and how you and transmitted with and in the
integrate application.
• Nearly fully reliant on the contract to
define governance/risk since you rely on
the provider for nearly everything
• Big variation in maturity in the market
• Often limited to what you see in the UI
Deployment Model Effects
PUBLIC CLOUD COMMUNITY/HYBRID PRIVATE CLOUD
ENVIRONMENT ENVIRONMENT ENVIRONMENT
• Reduced ability to govern • The governance strategy must • Governance/risk issues may be
ops consider the minimum common set similar to public if third-party
• Reduced ability to of controls comprised of the Cloud managed/hosted
negotiate contracts Service Provider’s contract and the • Provider may not negotiate
• Shared responsibilities organization’s internal governance contracts once terms set; e.g,.
model agreements. won't patch in timely manner
• Now have to calculate across 2 sets • Internal SLAS still used in private
of contracts
• Or are dealing With group-
negotiated contract and potential
of differing priorities
Tradeoff Considerations
• There are advantages and disadvantages to managing enterprise risk for
cloud deployments.
• These factors are more pronounced for public cloud and hosted private
cloud
• LESS
• Physical control over assets.
• Need to manage risks the provider accepts.
• MORE
• Reliance on SLA and contract.
• Requirement to manage the relationship and stay up to date.
• Assessment instead of testing.
Cloud Risk Management Tools
Governance Risk and Considerations
• Identify the shared responsibilities of security and risk management based on
the chosen cloud deployment and service model.
• Develop a Cloud Governance Framework/Model as per relevant industry best
practices, global standards, and regulations like CSA CCM, COBIT 5, NIST RMF,
ISO/IEC 27017, HIPAA, PCI DSS, EU GDPR, etc.
• Understand how a contract affects your governance framework/model.
• Obtain and review contracts (and any referenced documents) before entering into an
agreement.
• Don’t assume that you can effectively negotiate contracts with a cloud provider—but
this also shouldn’t necessarily stop you from using that provider.
• If a contract can’t be effectively negotiated and you perceive an unacceptable risk,
consider alternate mechanisms to manage that risk (e.g. monitoring or encryption).
Governance Risk and Considerations
• Develop a process for cloud provider assessments. This should include:
• Contract review.
• Self-reported compliance review.
• Documentation and policies.
• Available audits and assessments.
• Service reviews adapting to the customer’s requirements.
• Strong change-management policies to monitor changes in the organization’s
use of the cloud services.
• Cloud provider re-assessments should occur on a scheduled basis and
be automated if possible.
Governance Risk and Considerations
• Cloud providers should offer easy access to documentation and reports
needed by cloud prospects for assessments, for example, the CSA STAR
registry.
• Align risk requirements to the specific assets involved and the risk tolerance
for those assets.
• Create specific risk management and risk acceptance/mitigation
methodology to assess the risks of every solution in the space
• Use controls to manage residual risks.
• If residual risks remain, choose to accept or avoid the risks.
• Use tooling to track approved providers based on asset type (e.g. linked to
data classification), cloud usage, and management.
Conclusion
• Enterprise risk management includes all-risk management for the entire
organization.
• Information risk management focuses on the risk to information, and must still
align with the risk tolerance of the data owner.
• The effort in a risk assessment should align with the value of the data. Just
because something is moving to the cloud doesn't mean you now need to treat
it as being higher-value.
• ln terms of risk, like security, laaS is most closely aligned to traditional
infrastructure, while With SaaS there is a greater reliance on the cloud provider.
• Risks in private cloud may be similar to that of public cloud if the private cloud
is hosted and/or managed by a third party.
Unit 4 - Compliance
• Compliance and Audit
• How Cloud Changes Compliance
• Compliance Inheritance
Compliance and Audit
• OBLIGATIONS ARISE FROM MULTIPLE SOURCES
• Legislation
• Broad based regulation
• Industry specific regulation
• Contracts
• COMPLIANCE AND AUDITS
• Compliance validates awareness of and adherence to corporate obligations
• Audits are a key tool for proving (or disproving) compliance.
How Cloud Changes Compliance
• The cloud customer is always responsible for compliance but may now also rely on the
provider.
• Cloud customers will rely more on third-party assessments.
• Many cloud providers are certified for various regulations and industry requirements, such
as PCI DSS, SOC1, SOC2, HIPAA, best practices/frameworks like CSA CCM, and
global/regional regulations like the EU GDPR. These are sometimes referred to as pass-
through audits. A pass-through audit is a form of compliance inheritance
• Many cloud providers offer globally distributed data centers running off a central
management console/platform. The cloud management plane / metastructure may span
(s’étendre) jurisdictions, while the data/assets don't; this must be integrated into
compliance activities.
• Not all cloud providers are equal With regards to compliance, and not all services from a
single provider are always within the same audit / attestation / certification scope.
Compliance Inheritance
With compliance inheritance the cloud provider’s infrastructure is out of scope for a
customer’s compliance audit, but everything the customer configures and builds on
top of the certified services is still within scope.
Compliance and Audit Recommendations
• Compliance, audit, and assurance should be continuous.
• They should not be seen as merely point-in-time activities, and many
standards and regulations are moving more towards this model.
• This is especially true in cloud computing, where both the provider and
customer tend to be in more-constant flux and are rarely ever in a static
state.
Compliance and Audit Recommendations
• Cloud providers should:
• Clearly communicate their audit results, certifications, and attestations with
particular attention to:
• The scope of assessments.
• Which specific features/services are covered in which locations and jurisdictions.
• How customers can deploy compliant applications and services in the cloud.
• Any additional customer responsibilities and limitations.
• Cloud providers must maintain their certifications/attestations over time and
proactively communicate any changes in status.
• Cloud providers should engage in continuous compliance initiatives to avoid
creating any gaps, and thus exposures, for their customers.
• Provide customers commonly needed evidence and artifacts of compliance,
such as logs of administrative activity the customer cannot otherwise collect
on their own.
Compliance and Audit Recommendations
• Cloud customers should:
• Understand their full compliance obligations before deploying, migrating to, or developing
in the cloud.
• Evaluate a provider’s third-party attestations and certifications and align those to
compliance needs.
• Understand the scope of assessments and certifications, including both the controls and
the features/services covered.
• Attempt to select auditors with experience in cloud computing, especially if pass-through
audits and certifications will be used to manage the customer’s audit scope.
• Ensure they understand what artifacts of compliance the provider offers, and effectively
collect and manage those artifacts.
• Create and collect their own artifacts when the provider’s artifacts are not sufficient.
• Keep a register of cloud providers used, relevant compliance requirements, and current
status. The Cloud Security Alliance Cloud Controls Matrix can support this activity.
Conclusion
• Compliance is a tool to ensure organizations are meeting corporate
obligations.
• Audits are how we validate compliance, and they can be performed
internally or externally using third parties.
• Cloud changes compliance because it now becomes a shared responsibility
between the cloud consumer and the provider.
• Compliance inheritance is the principle that if a cloud provider's service is
compliant with a regulation/standard, then cloud consumers can build
compliant services/applications using that service.
• But it does not guarantee compliance since the cloud consumer can still build a
non-compliant application on top of a compliant service.
Unit 5 - Legal Issues In Cloud
• Laws & Implementing Regulations
• APAC Region (Asia-Pacific)
• EMEA Region (Europe Middle East & Africa)
• Americas Region
• Industry Standards
• Contracts
• Conclusion
Laws & Implementing Regulations
• Despite a common theme, countries on all continents have developed data
protection regimes that occasionally conflict with each other.
• As a result, cloud providers and cloud users operating in multiple regions struggle to
meet compliance requirements.
• In many cases, the laws of different countries might apply concurrently, in
accordance with the following:
• The location of the cloud provider
• The location of the cloud user
• The location of the data subject
• The location of the servers
• The legal jurisdiction of the contract between parties, which may be different than the
locations of any of the parties involved
• Any treaties or other legal frameworks between those various locations
Asia-Pacific (APAC)
APAC-Australia
• Two key laws provide protection to consumers of cloud services
• Privacy Act of 1988
• 13 Australian Privacy Principles (APPs)
• Applies to private, not-for- profits With 3+ million AUD, private healthcare providers
• Australian Consumer Law (ACL)
• Entities must provide notification when breaches occur
• ACL protects against false/misleading contracts and failed breach
notifications
• Privacy Act applies to Australian customers even if CSP (Cloud Service
provider) is based elsewhere
Asia-Pacific (APAC)
APAC-China
• 2017 Cyber Security Law governs network operators
• Data localization requires certain data is stored in the country
• Privacy landscape still in transition
Asia-Pacific (APAC)
APAC-JAPAN
• Act on the Protection of Personal Information (APPI) requires private
sector to protect personal information
• Prior consent is required for data transferred to 3rd party outside the
country
• Consent is not required if certain standards are met as outlined by the
Personal Information Protection Commission
APAC-RUSSIA
• Russian data protection laws require consent for most data processing
• Companies are required to store personal data of Russian citizens
within Russia
EMEA - EUROPEAN UNION &
EUROPEAN ECONOMIC AREA
• 2018 General Data Protection Regulation (GDPR)
• Member states can supplement the GDPR
• 2002 Directive on Privacy and Electronic Communications (new E-
Privacy Regulation to replace it)
• Network Information Security Directive (NIS Directive)
• Protects critical infrastructure and essential services
GENERAL DATA PROTECTION
RECULATION (GDPR)
• APPLICABILITY
• Applies to data controllers/ processors in the EU/EEA, or activities within and outside the EU/EEA
• Applies to controllers/ processors outside the EU/EEA if monitoring or processing data owned by an individual in the EU/EEA
• ACCOUNTABILITY OBLIGATIONS
• Entities must keep records of data processing activities
• Must develop and operate according to "privacy by design" and "privacy by default" principles
• DATA SUBJECTS' RIGHTS
• Subjects have a right to know what info an entity has about them
• Right to object to how personal data is used
• Right to data erasure/corrections
• Right to be forgotten
• CROSS-BORDER DATA TRANSFER RESTRICTIONS
• Personal data cannot transfer across borders unless a country has similar data and privacy rights.
• Entities outside of the EU/EEA must show an adequate level of protection
• BREACHES OF SECURITY
• Entities must report a security breach to the Supervisory Authority or Authorities and data subjects when the breach meets certain
thresholds.
• SANCTIONS
• Violators are subject to sanctions, up to 4% of global gross income, or up to EUR 20 million .
NETWORK INFORMATION SECURITY
DIRECTIVE (NIS)
• Requires that EU/EEA member states' laws govern network and
information security requirements for digital and essential services:
i.e., e-commerce, search engines, cloud computing.
• Providers outside the EU offering services inside the EU are
accountable.
• Providers must notify agencies if an incident substantially impacts the
provision of a service.
EMEA - COUNTRIES OUTSIDE EU/EEA
• Countries With similar protection laws such as GDPR or 1995 EU Data
Protection Directive: Dubai, Israel, Morocco, Senegal, South Africa,
Qatar.
Americas – Central & South
• Argentina, Chile, Colombia, Mexico, Peru and Uruguay have laws
inspired mainly by the European directive 95/46/EC
• Many laws refer to the APEC Privacy Framework
Americas – CANADA
• Personal Information Protection and Electronic Documents Act
(PIPEDA)
• Applies to entities subject to federal jurisdiction and all provincial
jurisdictions
Americas – UNITED STATES
• No single national law for data protection and regulation.
U.S. Federal Laws
• Among others, Gramm-Leach-BIiIey Act (GLBA), Accountability Act of
1996 (HIPAA), Children's Online Privacy Protection Act of 1998
(COPPA) all regulate privacy and information security.
• Companies must adopt reasonable security measures around
personal data.
• Organizations are responsible for subcontractors' actions.
U.S. STATE Laws
• State laws around data security apply to any entity that
collects/processes data of an individual living in that state, regardless
of where data is stored.
• Most state laws that address information security require a written
contract between the entity and the service provider mandating use
of reasonable security measures.
LAWS, AGENCIES, & LITICATION
• BREACHES OF SECURITY
• Private or gov't entities must notify individuals of security breaches.
• PRIVACY LAWS
• California Consumer Privacy Act (CCPA) protects data for individuals, families and devices. In effectJan.
2020 sign ificant implications.
• FEDERAL & STATE AGENCIES
• Federal Trade Commission (FTC) & state attorneys general also enforce accountability in entities
around privacy and security practices.
• These decrees give guidance around protection of personal information.
• LITIGATION & E-DISCOVERY
• Litigation in the US differs from other countries
• Each party can obtain documents through "discovery"
• Discovery is complex when documents are hosted in the cloud due data dispersion.
• Cloud will become the repository of most electronically stored information
• Providers and their clients must plan how to identify all documents
Industry Standards
• Created by private organizations, industry standards are not laws.
• Many industry standards related to the cloud are produced by these
organizations on the right side of the screen.
Contracts
• BEFORE ENTERING NEGOTIATIONS
• Due diligence of your own entity
• Due diligence of other party
• Does the service allow your company to meet its objectives & still be in compliance?
• CONTRACT TERMS
• Pricing
• Allocation of Risk/ResponsibiIity
• Termination
• Representation and Warranties
• Data/IP Ownership
• Data Location
• SLA
• Privacy/Privacy Level Agreement (PLA)
• DURING PERFORMANCE
• Monitoring
• Preparing for termination and transition
• Unintended contract
• Closing
Conclusion
• Due to the nature of the cloud, it has become easy to transfer data
across the globe. However, the ease of movement of the data makes
it susceptible to be caught under numerous legal systems.
• It is therefore important to appreciate the Wide variety - as well as
the amazing similarities - between the laws that govern cloud
services.
• ln the past 10 years, the number of countries having privacy or
security laws has more than doubled, and the number of laws that
govern the privacy or security of company data and personal data has
skyrocketed.
Conclusion
• GLOBAL TRENDS:
• Protection of privacy and allowing individuals to have some control over the collection and use of
their personal data.
• There is a concern for the security of personal data and company data. A significant number of laws
require the adoption of formal security policies
• Countries and states are recognizing that security breach occurs, far a variety of reasons - state
actors, hackers, disgruntled employees, negligence or inadvertent error. These breaches should be
notified to be affected parties. Numerous new require prompt disclosures to individuals and
government agencies.
• There is a concern that data laws many not be equivalent from state to state and countries are
establishing barriers to prevent the transfer of data ta those that do not offer "adequate
protection".
• Finally like for any other relationship, things are better recorded in writing. Contracts are important.
Cloud contract can be tricky because too easy to sign when they are just posted on a website far
the customer to click an "l agree". Make sure you read them carefully to and understand the terms.
Unit 6 - Audit
• Audit
• Previous Audit Results (Third- Party Attestations)
• Artifacts of Compliance
• Assessment Frequency
Audit
• Different types of audit / assessment / attestation have different
focuses and Vary across providers.
• Attestations are legal statements and providers may be required by
the auditor to have an NDA (nondisclosure agreement) With the
customer before releasing.
• Customers will likely be limited in their ability to assess (and
vulnerability assess) providers.
• These could be a security risk to the provider. Cloud providers should
have a rigorous portfolio of compliance attestations to support their
customers.
Previous Audit Results
(Third- Party Attestations)
• Be aware of when the
audit was performed,
the scope of the audit,
and the audit results.
Artifacts of Compliance
• Artifacts are the logs, documentation, and other materials needed for
audits and compliance; they are the evidence to support compliance
activities.
• Both providers and customers have responsibilities for producing and
managing their respective artifacts.
• Collecting and maintaining artifacts of compliance will change when
using a cloud provider
Artifacts of Compliance
• ln cloud, assessing risk is collecting all audit evidence and can be challenging
• Understand requirements for logging and what kinds of data to collect
• Change in management logs are common artifacts you need.
• Map what you need to your cloud provider
• Collect admin activity to have logs of changes
• Store artifacts in a central repository. Build architecture to store centrally.
• Key places to focus on:
• Management place
• Configuration pieces
• Adding more logging in applications
• System logs need to be pushed to a different location, ex: object storage on cloud provider
• Core of audit considerations:
• Make sure you know what you need to collect to meet compliance obligations
• Evaluate what you can get from your cloud provider and how to get it
• Store in a central location
• Build in extra logging to compensate for places where you lose visibility
Assessment Frequency
• Due to the evolving nature of a cloud service, more frequent
assessment is required.
• Consider STAR/CAIQ/CCM and other CSA tools and programs.
Conclusion
• Different types of audits and assessments have different focuses, and
even when the same name is used can have different focus and scope
across cloud providers.
• Cloud providers often limit the kinds of assessments their customers can
use since some of these, like vulnerability assessments, can't be
distinguished from real attacks without being constrained.
• Ensure you know the scope, results, and timing (dates) of previous
audits. Not all audits on a provider’s website are necessarily up to date
or cover the service under consideration.
• Cloud consumers are responsible for maintaining their own artifacts of
compliance for their own audits, such as log files.
Unit 7 - CSA Tools
• CCM
• CAIQ
• STAR
• STARWatch
CLOUD CONTROLS MATRIX (CCM)
• The CSA CCM is a controls framework for organizations to operate securely when
Cloud services are utilized.
• Intended for cloud providers, SaaS providers, other end-user services in the cloud
• Designed by SMEs across industries.
• Provides security principles to providers to define and apply best practices
• Assists customers to assess cloud providers
• Standardized guidance on control objectives in cloud-based IT systems
• Based on CSA Security Guidance, research artifacts, Mobile WG
• Addresses intra- and inter- org challenges by delineating (defining) control
ownership
CLOUD CONTROLS MATRIX (CCM)
• Normalizes security expectations, cloud taxonomy, and security
measures implemented in cloud supply chain
• Guides security efforts in vetting (examining) cloud providers, building
proposal requests and operational risk assessment.
• Aids in internal and external assessments and audits, and can submit
to CSA STAR registry
CCM tool
Structure of CCM Tool
• 16 security control domains
• identity and access management, encryption key management, human resources, Mobile Security
• Each domain has a set of control objectives
• overall there are 133 control objectives across all of the domain
• Controls map to
• one or more of the six high-level categories of architectural relevance to physical, Network, compute,
storage, application and data and
• one or more of the applicable delivery models SaaS, PaaS and IaaS
• Supplier relationship: Service provider and/or Tenant-consumer
• other industry accepted security standards regulations and Frameworks
• AICPA, BITS shared assessments, BSI Germany, Canada PIPEDA, CCM V1.X, COBIT 4.1, COBIT 5.0, COPPA, CSA
Enterprise Architecture, CSA Guidance, ENISA IAF, 95/46/EC, FedRAMP Security Controls, FERPA, GAPP, HIPAA /
HITECH Act, HITRUST CSF, ISO/IEC 27001:2013, ISO/IEC 27002:2013, ISO/IEC 27017:2015, ISO/IEC 270018:2015, ITAR,
Jericho Forum, Mexico - Federal Law on Protection of Personal Data Held by Private Parties, NERC CIP, NIST SP800-53
R3, NIST SP800-53 R4 App J, NZISM, ODCA UM: PA R2.0, PCI DSS , Shared Assessments 2017 AUP, IEC 62443-3-3:2013,
C5, NIST 800-53 R4 Moderate, AICPA TSC 2017, FedRAMP R4 Moderate.
Consensus Assessments Initiative Questionnaire
(CAIQ)
• The CSA CAIQ assesses the security postures of a cloud service provider.
• Originated in the CSA Consensus Assessments Initiative WG
• CAIQ is a simplified distillation of issues and control specs associated With cloud security
• Simple tool to standardize approach of validation of a cloud provider’s security postures
• Companion to CSA security guidance and CCM
• Helps cloud SPs assess security postures, provides single location for details about their
information security program
• Streamlines compliance assessments and improves communication between cloud SPs, business
partners, and customers
• Allows customers and auditors to ask the right questions of cloud provider about their security
posture.
• Consumers can use completed CAIQs to assess provider control and risk models.
• Helps organizations build assessment processes prior and during to engagement With cloud
provider.
CAIQ tool
Structure of CAIQ tool
• A series of 295 yes or no control assertion question
• Divided into security domain and the security control, in the same
manner of CCM
• A question ID extends the control ID for each question
• Assessment answers have three options yes no and not applicable
• A notes field to add any additional information or comment that
should be provided
• Same standards mapping as CCM
Security, Trust & Assurance Registry (STAR)
• Promotes security governance, assurance and compliance in the cloud.
• Based on CSA OCF (Open Certification Framework), CCM and CAIQ WGs.
• Third-party resources that encompasses key principles of transparency, auditing and standards
harmonization
• Initially launched in 2010, STAR addresses lack of transparency in a burgeoning market
• Supports cloud customers in evaluation and selection process, and helps cloud SPS to easily
communicate security posture to their customers.
• Offers self-assessment, third-party certification, and continuous auditing
• Increases security by requesting adherence to best practices by implement CCM
• Details security postures of security providers, offers assurance by indicating level of compliance
of CSA best practices
• Offers layered approach to cloud assurance: self-assessment, third-party certification and
attestation, and continuous auditing
• Customer can access security documentation for cloud providers from a single trusted repository
Security, Trust & Assurance Registry (STAR)
• https://cloudsecurityalliance.org/star/registry
• It's free and accessible to the public
• Multiple entries to search information about a particular organization
• Click on the links to go ahead and download any of their supporting
documentation
• Gain access to caiq and any other certification and supporting
documentation posted to start
• The registry is also accessible via API.
• Access is currently to CSA members
• content in a machine-readable format accessible through a simple application
programming interface
STARWatch
• The CSA STARWatch is an SaaS application to help cloud providers manage compliance
With CSA STAR requirements.
• STARWatch grew out of CSA's desires to manage CAIQ responses more effectively
• Facilitates adoption and implementation of CCM and CAIQ and streamlines provider
and consumer compliance efforts
• Allows users to create, edit, import, and export CAIQs
• Intended for users of cloud services, cloud SPs, IT auditors, security solution providers
and consultants
• Provides multi-user access to CCM and CAIQ in database format
• Incorporates a maturity model to measure the evolution of security posture of the org
• Assistance in mapping security requirements to those of CSA
• Relevant mapping to relevant standards/regs
Conclusion
• The Cloud Controls Matrix is a list of cloud security controls mapped by domain and
aligned to various regulatory frameworks.
• The CCM is an excellent tool for evaluating your cloud security controls and is useful
to both cloud providers and consumers.
• The Consensus Assessment Initiative Questionnaire is a standard set of security
questions for cloud providers. It allows cloud consumers to directly compare
providers, and allows providers to reduce the need to respond to non-standard RFPs.
• The Cloud Security Alliance Guidance (which this training is based on) tells you how
to implement your controls, while the CCM tells you which controls to implement.
• The Star Registry and StarWatch tool serve as central repositories for cloud provider
security documentation, including the CAIQ.
Module 4: Data Security for Cloud
Computing
• Unit 1 - Module Introduction
• Unit 2 - Cloud Data Storage
• Unit 3 - Securing Data In The Cloud
• Unit 4 - Encryption For IaaS
• Unit 5 - Encryption For PaaS & SaaS
• Unit 6 - Encryption Key Management
• Unit 7 - Other Data Security Options
• Unit 8 - Data Security Lifecycle
Objectives
• Understand the different cloud storage models
• Define security issues for data in the cloud
• Assess the role and effectiveness of access controls.
• Learn different cloud encryption models.
• Understand additional data security options
• Introduce data security lifecycle.
Unit 2 - Cloud Data Storage
• Cloud Data Storage Differences
• Cloud Data Storage Types
• Data Dispersion
• Controlling Data Migration to the Cloud
• CASB (Cloud Access Security Broker)
• Protecting Data as it Moves
Cloud Data Storage Differences
• All data is eventually stored on a physical device, but cloud platforms use
multiple types of data storage virtualization to abstract and build storage
pools.
• These are not necessarily off-the- shelf technologies that map to traditional data
storage virtualization, like SAN/NAS, that are well known.
• This storage may be expressed/exposed like traditional storage but under
the hood is quite different.
• Just like SDN
• Security focuses on access controls, encryption, and proper
configuration.
Cloud Data Storage Types
• VOLUME
• Essentially, virtual hard drives for VMs/instances.
• OBJECT
• Resilient file storage via API
• Object storage is similar to a file system. Not a normal filesystem, but closer to a
"database for files."
• DATABASE
• Includes relational and non-relational (NoSQL, key/value storage systems, file system
based databases (e.g. HDFS)).
• Not merely a DB running on an instance.
• APPLICATION / PLATFORM
• content delivery network (CDN), files stored in SaaS, caching, and other novel options..
Data Dispersion (Bit Splitting)
• The process takes chunks of data, breaks them up, and then stores
multiple copies on different physical storage to provide high
durability.
• Data stored in this way is thus physically dispersed. A single file, for
example, would not be located on a single hard drive.
Controlling Data Migration to the Cloud
• Before securing the data in the cloud, most
organizations want some means of managing what
data is stored in private and public cloud providers.
• To start, define your policies for which data types are
allowed and where they are allowed, then tie these
to your baseline security requirements.
• Then identify your key data repositories. Monitor
them for large migrations/activity using tools such as
Database Activity Monitoring (DAM) and File Activity
Monitoring (FAM). DAM: Database Access Monitoring
• To detect actual migrations, monitor cloud usage and CASB: Cloud Access Security Brokers
any data transfers. you can do this with the help of DLP: Data Loss Prevention
URL : Uniform Resource Locator Filtering
the following tools: CASB, URL filtering, DLP
Controlling Data Migration to the Cloud
• CASB: Cloud Access and Security Brokers (also known as Cloud Security Gateways)
• discover internal use of cloud services using various mechanisms such as network monitoring,
integrating with an existing network gateway or monitoring tool, or even by monitoring DNS queries.
• It can offer monitoring of activity on approved services through API connections (when available) or
inline interception (man in the middle monitoring).
• Many support DLP and other security alerting and even offer controls to better manage use of
sensitive data in cloud services (SaaS/PaaS/and IaaS).
• URL filtering: While not as robust as CASB, a URL filter/web gateway may help you
understand which cloud services your users are using (or trying to use).
• DLP: If you monitor web traffic (and look inside SSL connections) a Data Loss Prevention
(DLP) tool may also help detect data migrations to cloud services.
• However, some cloud SDKs and APIs may encrypt portions of data and traffic that DLP tools can’t
unravel, and thus they won’t be able to understand the payload.
CASB (Cloud Access Security Broker)
• known as Cloud Security Gateways
• Discover: What cloud services are employees using?
• DNS records
• URL filters
• Secure web gateways
• Monitor :
• Auditability of cloud services
• SaaS especially lacks the ability to monitor what employees are doing
• CASB monitors traffic from outside
• Protect
• Provides security controls
• Generic or more specific controls for cloud providers
• How do these tools connect?
• API - Cloud providers don't always have access to APIs
• Inline/Proxy - Via CASBs in the cloud. Problematic, last resort if API doesn't work, but can work for SaaS
• Inline/Local
Protecting Data as it Moves
• Options for access controls will vary based on cloud service model and provider-specific features.
• Granularity and implementation vary massively between platforms, services, and technologies
• The finer-grained the access controls the better for security, but the harder for manageability
• Create an entitlement matrix based on platform-specific capabilities.
• An entitlement matrix documents which users, groups, and roles should access which resources and functions.
• It's critical to create platform-specific entitlement matrices
Entitlement Matrix
• Two methods
• Instance-managed encryption: The
encryption engine runs within the instance,
and the key is stored in the volume but
protected by a passphrase or keypair.
• Externally managed encryption (preferred):
The encryption engine runs in the instance,
but the keys are managed externally and
issued to the instance on request.
Instance-Managed Encryption
Object Storage Encryption
• There are 3 methods:
• Client-side encryption: When object storage is used as the back-end for an
application (including mobile applications), encrypt the data using an
encryption engine embedded in the application or client.
• Server-side encryption: Data is encrypted on the server (cloud) side after
being transferred in. The cloud provider has access to the key and runs the
encryption engine.
• Proxy encryption: In this model, you connect the volume to a special instance
or appliance/software, and then connect your instance to the encryption
instance. The proxy handles all crypto operations and may keep keys either
onboard or externally.
Conclusion
• There are multiple layers where you can encrypt each with benefits and
complications. Encrypting higher in the application stack is often best for
discreet data, while Iower-level encryption, like volume, is better for bulk data.
• Encryption systems are composed of the data, the encryption engine, and the
key management, where you place these determines the architecture and
affects the security of the system.
• Whenever possible, you want to separate the encryption key from the data
and the encryption engine.
• For object storage encryption, you can encrypt the data on the client site, the
server side (using multiple techniques), or even through storage proxies (which
we frequently see used for site backups).
Unit 5 - Encryption For PaaS & SaaS
• Encrypting PaaS
• Example - Application Encryption
• Encrypting SaaS
• Proxy Encryption for SaaS
Encrypting PaaS
• PaaS encryption varies tremendously due to different PaaS platforms.
• Application layer encryption: Encrypt within your app code or Encrypt before sending to the
platform
• Database encryption: Data is encrypted in the database using encryption that’s built in and
is supported by a database platform like Transparent Database Encryption (TDE) or at the
field level.
• Other: These are provider-managed layers in the application, such as the messaging queue.
There are also IaaS options when that is used for underlying storage.
• When you control the code, you can always encrypt there, which is also more
portable.
• Volatile memory and swap files may be issues; understand your platform specifics.
• If you are the provider, use per- customer keys as much as possible.
Example - Application Encryption
Encrypting SaaS
• SaaS providers may use any of the options previously discussed.
• It is recommended to use per customer keys when possible, in order
to better enforce multitenancy isolation.
• The following options are for SaaS consumers:
• Provider-managed encryption: Data is encrypted in the SaaS application and
generally managed by the provider.
• Proxy encryption: Data passes through an encryption proxy before being sent
to the SaaS application.
Proxy Encryption for SaaS
Not going to break as much: Breaks:
• Basic text file • Data that needs analysis
• Word doc
• Higher baseline security : providers, especially major IaaS and PaaS providers, have significant economic incentives
to maintain higher baseline security than most organizations
• Responsiveness / agility : APIs and automation provide extensive flexibility to build more responsive
security programs at a lower cost than in traditional infrastructure
• Isolated environments: Cloud applications can also leverage virtual networks and other structures, including PaaS, for hyper-
segregated environments
Opprtunities
• Independent VMs for microservices: Security is further enhanced by the use of micro-service architectures.
Developers can instead deploy more, smaller virtual machines, each dedicated to a function or service.
• Elasticity : Elasticity enables greater use of immutable infrastructure. When using elasticity tools like auto-scale groups, each
production system is launched dynamically based on a baseline image, and may be automatically deprovisioned without
human interaction
• DevOps : automation of application development and deployment
• Unified interface: unified interface (management interface and APIs) for infrastructure and application services (when using
PaaS) provides a more comprehensive view and better management compared to the traditional disparate systems and
devices (load balancers,servers, network devices, firewalls, ACLs, etc.), which are often managed by different groups.
• Limited visibility: Visibility and the availability of monitoring and logging are impacted
• Increased application scope: The management plane/metastructure security directly affects the security of any
Challenges
• Cloud computing, due to its elasticity and massive storage capabilities, is very often where big data projects
are deployed
• Big data is not exclusive to cloud by any means, but big data technologies are very commonly integrated
into cloud-computing applications and offered by cloud providers as IaaS or PaaS.
Big Data
• There are three common components of big data, regardless of the specific
toolset used:
• Distributed data collection: Mechanisms to ingest large volumes of data, often of a
streaming nature. This could be as “lightweight” as web-click streaming analytics and
as complex as highly distributed scientific imaging or sensor data. Not all big data
relies on distributed or streaming data collection, but it is a core big data technology.
• Distributed storage: The ability to store the large data sets in distributed file systems
(such as Google File System, Hadoop Distributed File System, etc.) or databases
(often NoSQL), which is often required due to the limitations of non-distributed
storage technologies.
• Distributed processing: Tools capable of distributing processing jobs (such as map
reduce, spark, etc.) for the effective analysis of data sets so massive and rapidly
changing that single origin processing can’t effectively handle them.
Big Data
Big Data security
• Security and Privacy Considerations
• Due to a combination of the highly distributed nature of big data applications and the sheer (total)
volume and potential sensitivity of the information, security and privacy are typically high priorities
but are challenged by a patchwork ( )مرقعof different tools and platforms.
• Data Collection
• Data collection mechanisms will likely use intermediary storage that needs to be appropriately
secured.
• Even if primary storage is well-secured it’s important to also check intermediary storage (some swap
space on a processing node)
• Key Management
• Key management for storage may be complicated depending on the exact mechanisms used due to
the distributed nature of nodes.
• There are techniques to properly encrypt most big data storage layers today
• The complicating factor is that key management needs to handle distributing keys to multiple storage
and analysis nodes
Big Data security
• Security Capabilities
• Not all big data technologies have robust security capabilities.
• Cloud provider security capabilities can help compensate for the big data technology limitations.
• Both should be included in any security architecture.
• Identity and Access Management
• Identity and Access Management will likely occur at both cloud and big data tool levels, which can
complicate entitlement matrices.
• PaaS
• Many cloud providers are expanding big data support with machine learning and other platform as
a service options that rely on access to enterprise data.
• These should not be used without a full understanding of potential data exposure, compliance, and privacy
implications.
• This doesn’t mean you shouldn’t use the services, it just means you need to understand the
implications and make appropriate risk decisions.
Big Data Cloud Security (brief)
• KNOW YOUR PLATFORM
• Capabilities vary greatly between both providers and platforms
• If you use machine learning/Al, understand the security and privacy model.
• SECURING ALL THE STORAGE
• Including intermediary storage like containers or storage volumes for vms
performing processing
• SECURE THE PLATFORM
• Big data platforms still have relatively Iow inherent security.
• Look to paas and isolated virtual networks
• ENCRYPTION KEY MANAGEMENT
• No change to the fundamentals, but BYOK most likely required if paas involved.
Internet of Things Security priorities
• The Internet of Things is a blanket term (terme générique) for non-traditional computing
devices used in the physical world that utilize Internet connectivity.
• A very large percentage of these devices connect back to cloud computing infrastructure for
their back-end processing and data storage.
• Key cloud security issues related to IoT include:
• Secure data collection and sanitization.
• Device registration, authentication, and authorization.
• One common issue encountered today is use of stored credentials to make direct API calls to the back-end cloud provider.
• attackers decompile applications or device software and then use those credentials for malicious purposes.
• API security for connections from devices back to the cloud infrastructure.
• The APIs themselves could be decoded and used for attacks on the cloud infrastructure.
• Encrypted communications.
• Many current devices use weak, outdated, or non-existent encryption
• Ability to patch and update devices so they don’t become a point of compromise.
• Currently, it is common for devices to be shipped as-is and never receive security updates for operating systems or applications.
Internet of Things Security priorities
Encrypted Communications
Data Collection
Mobile and Cloud
• Most mobile apps connect back to cloud.
• The primary security issues for mobile computing (in the cloud
context) are very similar to IoT, except a mobile phone or tablet is also
a general purpose computer:
• Device Registration, Authentication, & Authorization
• Stored credentials are a risk.
• Including federation tokens with long refreshes
• Application APIs can expose the cloud deployment if not secured properly
• Attackers are known to sniff API connections, and then decompile the API calls and
explore them for security weaknesses.
• Certificate pinning/validation inside the device application may help reduce this risk.
Serverless
• Serverless computing is the extensive use of certain PaaS capabilities to such a degree that all or some of an
application stack runs in a cloud provider’s environment without any customer-managed operating systems,
or even containers.
• “Serverless computing” is a bit of a misnomer since there is always a server running the workload
• But this server and its configuration and security are completely hidden from the cloud user.
• The consumer only manages settings for the service.
• Serverless includes services such as:
• Object storage
• Cloud load balancers
• Cloud databases
• Machine learning
• Message queues
• Notification services
• Code execution environments (generally restricted containers where a consumer runs uploaded application code.)
• API gateways
• Web servers
• Serverless capabilities may be deeply integrated by the cloud provider and tied together with event driven
systems and integrated IAM and messaging
Serverless security
• key issues include:
• Serverless places a much higher security burden on the cloud provider. Choosing your provider and
understanding security SLAs and capabilities is absolutely critical.
• Using serverless, the cloud user will not have access to commonly-used monitoring and logging levels, such
as server or network logs. Applications will need to integrate more logging, and cloud providers should
provide necessary logging.
• Not necessarily every service will match every potential regulation. Providers need to keep compliance
mappings up to date, and customers need to ensure they only use services within their compliance scope.
• There will be high levels of access to the cloud provider’s management plane since that is the only way to
integrate and use the serverless capabilities.
• Serverless can dramatically reduce attack surface and pathways and integrating serverless components may
be an excellent way to break links in an attack chain.
• Any vulnerability assessment or other security testing must comply with the provider’s terms of service.
Cloud users may no longer have the ability to directly test applications, or must test with a reduced scope.
• Incident response may also be complicated and will definitely require changes in process and tooling to
manage a serverless-based incident.
Serverless (brief)
• Includes PaaS and Function as a Service
• New frameworks being released at a rapid pace (step, stride)
• IAM and logging are key security issues for serverless apps
• Often provides more security benefits than downside due to pushing
more security responsibility onto the cloud provider (in the shared
responsibilities model)
Recommendations – Big Data
• Leverage cloud provider capabilities wherever possible, even if they overlap with big data tool security capabilities.
• Use encryption for primary, intermediary, and backup storage for both data collection and data storage planes.
• Include both the big data tool and cloud platform Identity and Access Management in the project entitlement matrix.
• Fully understand the potential benefits and risks of using a cloud machine-learning or analytics service. Pay particular
attention to privacy and compliance implications.
• Cloud providers should ensure customer data is not exposed to employees or other administrators
• Cloud providers should clearly publish which compliance standards their analytics and machine-learning services are
compliant with (for their customers).
• Cloud users should consider use of data masking or obfuscation when considering a service that doesn’t meet
security, privacy, or compliance requirements.
• Follow additional big data security best practices, including those provided by the tool vendor (or Open Source
project) and the Cloud Security Alliance.
Recommendations – IoT
• Ensure devices can be patched and upgraded.
• Do not store static credentials on devices that could lead to compromise of the
cloud application or infrastructure.
• Follow best practices for secure device registration and authentication to the cloud-
side application, typically using a federated identity standard.
• Encrypt communications.
• Use a secure data collection pipeline and sanitize data to prevent exploitation of the
cloud application or infrastructure through attacks on the data-collection pipeline.
• Assume all API requests are hostile.
• Follow the additional, more-detailed guidance issued by the CSA Internet of Things
Working Group.
Recommendations – Mobile
• Follow your cloud provider’s guidance on properly authenticating and authorizing mobile devices
when designing an application that connects directly to the cloud infrastructure.
• Use industry standards, typically federated identity, for connecting mobile device applications to
cloud-hosted applications.
• Never transfer unencrypted keys or credentials over the Internet.
• Test all APIs under the assumption that a hostile attacker will have authenticated, unencrypted
access.
• Consider certificate pinning and validation inside mobile applications.
• Validate all API data and sanitize for security.
• Implement server/cloud-side security monitoring for hostile API activity.
• Ensure all data stored on device is secured and encrypted.
• Sensitive data that could allow compromise of the application stack should not be stored locally on-device
where a hostile user can potentially access it.
• Follow the more detailed recommendations and research issued by the CSA Mobile Working
Group.
Recommendations – Serverless Computing
• Cloud providers must clearly state which PaaS services have been assessed against
which compliance requirements or standards.
• Cloud users must only use serverless services that match their compliance and
governance obligations.
• Consider injecting serverless components into application stacks using architectures
that reduce or eliminate attack surface and/or network attack paths.
• Understand the impacts of serverless on security assessments and monitoring.
• Cloud users will need to rely more on application-code scanning and logging and less on server
and network logs.
• Cloud users must update incident response processes for serverless deployments.
• Although the cloud provider is responsible for security below the serverless platform
level, the cloud user is still responsible for properly configuring and using the products.
Conclusion
• Related techrologies are key technologies often seen with, used by, Cloud deployments.
• Big Data, the Internet of Things, mobile computing, and serverless computing.
• Big Date platforms tend to have Iow inherent security, so using the Cloud for isolation is
important. It’s also critical to understand where and how data is stored and, often, to
protect it with distributed encryption.
• The Internet of Things often uses Cloud computing for end processing application logic, and
data storage. Security concerns tend to focus on device and user authentication and
authorization, secure communications, and data storage.
• Mobile issues are often very similar to those of IOT when it comes to Cloud as the Cloud
becomes the back-end for many mobile apps.
• Serverless is a cloud-native technology used in most modern deployments to some degree.
IAM and logging tend to be security focus since they are so different compared to on-
premise or Even virtualized workIoads.
Unit 7 - CCSK Exam Preparation
• Preparing for the CCSK Exam
• Helpful Hints
• CCSK Exam Platform
• Final Knowledge Check
• Closing
Preparing for the CCSK Exam
• STUDY THE GUIDANCE AND ENISA DOCUMENTS.
• CSA Guidance:
• https://cloudsecurityalliance.org/download/security- guidance-v4/
• ENISA:
• https://www.enisa.europa.eu/publications/cloud-
computing-risk-assessment/at_download/fullReport
• The CAQ and CCM:
• https://cloudsecuritya/liance.org/group/consensus- assessments/# overview
• https://cloudsecurityalliance.org/group/cloud- controls-matrix/# overview
• REVIEW THE CCSK PREP KIT AT:
• https://cloudsecurityalliance.org/education/ccsk/stud y-guide
Helpful Hints
• Read the Guidance 3-4 times and have it With you.
• As With any test, the wording is weird (starnge), but if you are familiar With the material and
know where to check in the Guidance, you should be fine.
• Don’t wait to long after this training to take your test. If you don’t already have a test token
you should receive it in a couple of business days.
• If you have technical issues,
• email: [email protected]
• IF YOU PURCHASED A TOKEN WITH THIS TRAINING YOU SHOULD HAVE RECEIVED AN EMAIL
ABOUT YOUR EXAM TOKEN.
• When you are completing the process to redeem (exchange, convert) your token be sure you use the
same email you used to register for this training.
• YOU WILL HAVE TWO ATTEMPTS TO PASS THE EXAM.
• THE EXAM IS TIMED (90 MINUTES), BUT OPEN BOOK.
CCSK Exam Platform
Final Knowledge Check
Closing
Extra
cloud native
• The term cloud native refers to an application that was designed to
reside in the cloud from the start. Cloud native involves cloud
technologies like microservices, container orchestrators, and auto
scaling.