+ All Categories
Home > Documents > © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX)...

© Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX)...

Date post: 23-May-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
27
1 © Copyright 2011 EMC Corporation. All rights reserved.
Transcript
Page 1: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

1 © Copyright 2011 EMC Corporation. All rights reserved.

Page 2: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

2 © Copyright 2011 EMC Corporation. All rights reserved.

Page 3: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

3 © Copyright 2011 EMC Corporation. All rights reserved.

How risky is the Cloud?

Page 4: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

4 © Copyright 2011 EMC Corporation. All rights reserved.

Is Cloud worth it? YES!

Page 5: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

5 © Copyright 2011 EMC Corporation. All rights reserved.

Cloud adds the concept of Supply Chain

Page 6: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

6 © Copyright 2011 EMC Corporation. All rights reserved.

Cloud Computing Definition

National Institute of Standards and Technology (NIST Special Publication 800-145 (Draft)

–  Model for enabling ubiquitous, convenient, on-demand

network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services)

–  Rapidly provisioned and released with minimal management effort or service provider interaction

–  Composed of 5 essential characteristics, 3 service models, and 4 deployment models.

–  Source: http://www.nist.gov/itl/csd/cloud-020111.cfm

Page 7: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

7 © Copyright 2011 EMC Corporation. All rights reserved.

Cloud Computing 5 Essential Characteristics

•  On-demand tenant self-service model for provisioning computing capabilities (server time, network storage, etc.)

•  Broad network access with capabilities over the network accessible by standard mechanisms and mobile platforms

•  Resource pooling through dynamically assigned physical and virtual capabilities delivered in a multi-tenant model and location independent

•  Rapid elasticity of provisioned resources automatically or manually adjusted aligned with service level flexibility and needs

•  Measured service to monitor, control and report on transparent resource optimization

Page 8: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

8 © Copyright 2011 EMC Corporation. All rights reserved.

Cloud Computing 3 Service Models

•  Software as a Service (SaaS) •  Capability made available to tenant (or consumer) to use provider’s applications

running on cloud infrastructure, accessible via web browser, mobile apps, and system interfaces.

•  Examples: Salesforce.com, Drop Box, Box.net, Google Docs, WebEx •  Platform as a Service (PaaS)

•  Capability made available to tenant to deploy tenant owned (created or acquired) applications using programming languages and tools supported by provider.

•  Examples: Microsoft Azure, Amazon Web Services, Bungee Connect •  Infrastructure as a Service (IaaS) / Datacenter as a Service (DaaS)

•  Capability made available to tenant to provision processing, storage, networks or other fundamental computing resources to host and run tenant’s applications.

•  Examples: Rackspace, Terremark (Verizon), Savvis, AT&T

Page 9: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

9 © Copyright 2011 EMC Corporation. All rights reserved.

Cloud Computing Deployment Models

(1) PRIVATE (2) COMMUNITY (3)PUBLIC

ACCESSIBILITY Single Organization Shared with

Common Interests / Requirements

General Public / Large Industry

Group

MANAGEMENT Organization or Third Party

Organization or Third Party Cloud Provider

HOST On or Off Premise On or Off Premise On or Off Premise

(4) HYBRID

Page 10: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

10 © Copyright 2011 EMC Corporation. All rights reserved.

•  Embrace and accept this rapid change for Corporate IT and weigh the business benefits and risks.

•  Adopt and

integrate guidance and toolkits for improved Governance, Risk & Compliance.

What should we do?

Page 11: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

And some more Numbers Source: Gartner

•  Worldwide Cloud Services Market to reach $148.8 billions in 2014

–  $58.6 billion in 2009 –  $68.3 billion in 2010

•  Spending to reach $112 billion within 5 years

•  Sector by Sector adoption –  Financial Services –  Manufacturing –  Communications and High Tech –  Public Sector

Page 12: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

Adoption by Region Source: Gartner

0%

10%

20%

30%

40%

50%

60%

70%

USA Western Europe

Japan Other

2010 2014

Page 13: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

13 © Copyright 2011 EMC Corporation. All rights reserved.

GRC Insures the integrity of the

chain

Chains are only as strong as the weakest link

Page 14: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

14 © Copyright 2011 EMC Corporation. All rights reserved.

EU Concerns Cloud Computing Strategy DIGIT-IPM

Questions to be answered:

–  Legal Framework

–  Technical and Commercial Fundamentals

–  The Market

Page 15: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

Top Five Barriers to Cloud Adoption Source: CIO Magazine:

 Security  Openness  Portability  Reliability  Integration

http://www.zdnet.co.uk/videos/view/online-business/experts-highlight-barriers-to-cloud-adoption-260682411/

Page 16: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

16 © Copyright 2011 EMC Corporation. All rights reserved.

Cloud Computing Security: Largest Barrier to Adoption

Page 17: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

Barriers Become Opportunity

Information Technology

Legal & Corporate Compliance

Finance & Business Operations

Security

Management and audit needs dashboards and

analytics that

Increase visibility, improve decision making,

manage risk within appetites

  Drive accountability into day to day operating fabric

  Prioritize and scope risk

assessments

•  VP, Enterprise Risk Mgt •  Lines of Business VPs •  VP, Risk Mgt/Compliance •  CFO •  VP, Internal Audit

•  VP, Legal and Compliance •  Chief Information Officer •  Chief Legal Counsel • Chief Compliance Officer

•  Chief Information Officer •  VP, IT Risk Mgt/Compliance •  VP, Applications •  VP, BCM/DR •  VP, Infrastructure

•  Chief Information Security Officer (CISO) •  Director, Security Ops

Legal and compliance needs automated

discovery, policy and risk analysis

  Align policies with business and legal

imperatives

  Understand discoverable information

risks, processes and assets in context

Leverage common,

traceable system of record

IT operations needs continuous,

automated, consolidated assessments

  Translate business appetite for risk into

IT thresholds

  Streamline policy and assessments across all IT

assets

  Drive down costs, improve accuracy and improve

efficiencies

Security needs to integrate information risk analysis with IT and the

business

  Leverage security metrics and assessment for

IT and enterprise risk

  Protect information according to its

importance and criticality to the business

  Drive down costs,

improve accuracy and improve efficiencies

Page 18: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

18 © Copyright 2011 EMC Corporation. All rights reserved.

Why do we need Standards?

•  Use of available technical expertise, enhanced trade •  Common metrics for service level expectations •  Essential to the cloud supply chain •  Open global markets •  Required by legal and accounting professions •  Increased automation

Page 19: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

GRC Automation

Traceability

Legal & Compliance

Finance & Business

Operations

Information Technology Security

Business Processes, Policies, SLAs, Guidelines, Reports, Incidents

Control Validation Evidence, Transactional Data, KPIs, Events, Operational/business/ legal

Environment

Risk Control Frameworks, Standards & Libraries Service

Provider

Enterprise

Transparency

Goals Objectives Assessments Measures and Metrics

GRC Dashboards

Page 20: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

GRC Automation Standards

Traceability

Legal & Compliance

Finance & Business

Operations

Information Technology Security

GRC Dashboards

Business Processes, Policies, SLAs, Guidelines, Reports, Incidents

Control Validation Evidence, Transactional Data, KPIs, Events, Operational/business/ legal

Environment

Risk Control Frameworks, Standards & Libraries Service

Provider

Enterprise

Transparency

Goals Objectives Assessments Measures and Metrics

ISO 27000, NIST 800-53, GRC-XML OCEG, CSA, IFAC ITIL, eTOM, IETF, COSO

ITU-T CYBEX, NIST SCAP +, CIM, DMTF

Page 21: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

International Standards driving Cloud Trust

Frameworks and Guidance to provide transparency via automation •  International Telecommunications Union (ITU-T) Study Group 17, Question 4

–  Cyber Security Exchange (CYBEX) –  Pulls together techniques and protocols to enable continuous monitoring and incident coordination

•  International Standards Organization (ISO) 27000 SC 27 JTC 1 –  Security standards framework and ISMS Guidance –  Risk assessment process

•  Internet Engineering Task Force (IETF) –  Protocols to enable secure exchange of information, such as incidents

•  Cloud Security Alliance (CSA) –  Developing guidance and set of cloud specific controls –  Work in process of integration into international standards bodies

•  National Institute of Standards and Technology (NIST) –  Security Content Automation Protocol (SCAP) plus standards joint from MITRE and NIST also in ITU CYBEX

•  Open Compliance and Ethics Group (OCEG) –  GRC-XML used to format reports that include risk information and rules

•  International Federation of Accountants (IFAC) –  Develops international standards on ethics, auditing and assurance, education, and public sector accounting

Page 22: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

Current State of GRC enabled Cloud Trust Cloud Security Alliance (CSA) initiatives: manual, moving toward automation

•  Consensus Assessment Initiative –  Lightweight common assessment criteria –  148 Questions to assess security of a cloud

provider –  Cloud specific controls developed with CSA

guidance

•  Cloud Control Matrix –  98 controls –  Bridging regulatory governance and practical

compliance –  Similar to the audit world’s concept of

“continuous audits”

•  Cloud Audit –  Provides a namespace to assist with

automation of audit and assessment

Page 23: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

23 © Copyright 2011 EMC Corporation. All rights reserved.

Cloud Matrix Semantic Technologies

Rules and the Cloud

Page 24: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

24 © Copyright 2011 EMC Corporation. All rights reserved.

Cloud Computing and Intelligent Data Centers

  Quality of Service   Service Level Management   Rule-based service configuration   Nested Multi-Tier Security   Automated GRC   LegalRuleML and SLAs

  Software Agents as Cloud Services   Ontologies   Rules

Page 25: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

25 © Copyright 2011 EMC Corporation. All rights reserved.

Cloud Computing and Intelligent Data Centers

  Common vocabulary for federated systems on the Cloud

  Semantic Heterogeneity   Interoperability/Portability

  Self-sustaining Data Centers   Dynamic deployment of resources   Interactive Service Providers-Consumers Audits

  Policy-based Multi-Tenancy

Page 26: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

26 © Copyright 2011 EMC Corporation. All rights reserved.

Conclusions

Page 27: © Copyright 2011 EMC Corporation. All rights reserved. 1 · – Cyber Security Exchange (CYBEX) – Pulls together techniques and protocols to enable continuous monitoring and incident

27 © Copyright 2011 EMC Corporation. All rights reserved.

Thank You!

Questions?


Recommended