isaca cloud security presentation 2013-09-24

32
Cloud Security Major Hayden, Rackspace

Upload: major-hayden

Post on 10-May-2015

220 views

Category:

Technology


1 download

DESCRIPTION

Delivered for ISACA's San Antonio chapter on September 24th, 2013. Covers cloud security and related questions from IT auditors.

TRANSCRIPT

Page 1: ISACA Cloud Security Presentation 2013-09-24

Cloud SecurityMajor Hayden, Rackspace

Page 2: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 2

Why are we here today?

Page 3: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 3

Who am I?

Chief Security Architect at Rackspace

Red Hat Certified Architect and MySQL DBA

Five years of cloud operations experience Integrated Slicehost with Rackspace Launched Rackspace’s Cloud Servers product

based on Slicehost technology Launched Rackspace’s Open Cloud Servers

powered by OpenStack

Page 4: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 4

Today’s big three

1. An understandable and repeatable definition of cloud really does exist (and I’ll help you learn it)

2. There are different cloud deployment strategies and you can secure each of them

3. Cloud hosting risks are very similar to the risks from other IT hosting methods

Page 5: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 5

What is cloud hosting?

Page 6: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 6

Cloud hosting is a shift from managing

computersto utilizing

computing resources

Page 7: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 7

Page 8: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 8

Colocation

Dedicated

Managed Cloud

Page 9: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 9

Colocation

Dedicated

Managed Cloud

Page 10: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 10

Colocation

Dedicated

Managed Cloud

Page 11: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 11

Colocation

Dedicated

Managed Cloud

Page 12: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 12

Key points

Resources are always available

Pay for what you use

Fewer fixed costs, more variable costs

Maintain business focus

Page 13: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 13

Cloud hostingbrings new challenges

Page 14: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 14

Homes vs. Apartments

Flickr: atelier_tee Flickr: oldtasty

Page 15: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 15

Key points

Can’t choose your neighbors

Fluctuating performance

Stay within the confines of the system

Service providers can touch your data*

Page 16: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 16

Cattle vs. Pets(Credit goes to Gavin McCance at CERN for this analogy)

Page 17: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 17

Key points

Rely on automation

Use configuration management

Build in redundancy based on business needs

Page 18: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 18

Cloud types:Public, Private, and Hybrid

Page 19: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 19

Benefits

Public: easily expandable and cheap

Private: host with provider or host internally, fewer noisy neighbor issues, compliance is easier

Hybrid: helpful for bridging into cloud, allows for the workloads to run where they run best

Page 20: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 20

Let’s go throughyour questions

Page 21: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 21

What due diligence should a company

perform when selecting cloud

services?

Page 22: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 22

Due diligence

Easy answer: Assess a cloud provider just as you would any other provider of IT services

Look for business practice and security maturity

Test the provider thoroughly ahead of time

Monitor the provider’s actions closely around outages or when receiving support

Page 23: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 23

What are somegood contractual

agreement clauses?

Page 24: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 24

Contractual agreements

Confidentiality and security requirements

Encryption standards*

Service description and SLA’s

Indemnification

Page 25: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 25

What are the risksif the company

owns the servers?

Page 26: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 26

Company-owned server risks

Similar to self-hosted or vendor-hosted IT services on dedicated equipment

IT staff that maintain the servers will have some level of access to virtual machine data

Page 27: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 27

Does the internet-facing nature of

public cloud create additional risks?

Page 28: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 28

Public cloud networking risks

About the same as internet-facing dedicated hardware

Some public clouds may have hardware networking devices such as firewalls or load balancers

Other providers might provide a shared firewall or load balancer environment to use

Page 29: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 29

How do I securely store data in cloud

services?

Page 30: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 30

Storing data in cloud

Your data is never fully safe in any storage

Understand your most probable threats first

Make your data less useful to others Encryption with digital signatures Sharding Tokenization (can help with data transport

laws) Hardware Security Module (HSM)

Page 31: ISACA Cloud Security Presentation 2013-09-24

Cloud Security // ISACA San Antonio 2013-09-24 31

Thanks for inviting me!

Q&A?

Have more questions [email protected]

mhttp://major.io/

Page 32: ISACA Cloud Security Presentation 2013-09-24

Cloud SecurityMajor Hayden, Rackspace