+ All Categories
Home > Technology > Cloud data governance, risk management and compliance ny metro joint cyber security conference...

Cloud data governance, risk management and compliance ny metro joint cyber security conference...

Date post: 05-Dec-2014
Category:
Upload: ulf-mattsson
View: 204 times
Download: 3 times
Share this document with a friend
Description:
The rapid rise of cloud data storage and applications has led to unease among adopters over the security of their data. Whether it is data stored in a public, private or hybrid cloud, or used in third party SaaS applications, companies have good reason to be concerned. In this session Protegrity CTO and data security thought leader Ulf Mattsson will focus on practical advice on what to look for in cloud service providers and a review of the technologies and architectures available to protect sensitive data in the cloud, both on- and off-site. Through real life use cases, Ulf will discuss solutions to some of the most common issues of data governance, usability, compliance and security in the cloud environment.
49
Cloud Data Governance, Risk Management & Cloud Data Governance, Risk Management & Compliance NY Metro Joint CyberSecurity Conference Ulf Mattsson CTO, Protegrity Ulf . Mattsson AT protegrity .com
Transcript
Page 1: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Cloud Data Governance, Risk Management & Cloud Data Governance, Risk Management & Compliance

NY Metro Joint CyberSecurity Conference

Ulf MattssonCTO, Protegrity

Ulf . Mattsson AT protegrity .com

Page 2: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Cloud Security Alliance (CSA)

PCI Security Standards Council

• Cloud & Virtualization SIGs

• Encryption Task Force

• Tokenization Task Force

Ulf Mattsson, Protegrity CTO

ANSI X9

• American National Standard for Financial Services

IFIP WG 11.3 Data and Application Security

• International Federation for Information Processing

ISACA (Information Systems Audit and Control Association)

ISSA (Information Systems Security Association)

2

Page 3: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

What are the Concerns with Cloud?

How is Cloud Computing Defined?

What is the Guidance for Cloud Data Security?

What New Data Security Technologies are

Key Topics

What New Data Security Technologies are Available for Cloud?

How can Cloud Data Security work in Context to the Enterprise?

3

Page 4: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

What are the Concerns

with Cloud?

4

with Cloud?

Page 5: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

What Is Your No. 1 Issue Slowing Adoption of Public Cloud Computing?

5

Page 6: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Sensitive Data in the Cloud

6

Of organizations currently (or plan to) transfer sensitive/confidential data to the cloud in the next

24 mo.

Page 7: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Lack of Cloud Confidence

7

Number of survey respondents that either agree or are unsure that the cloud services used by their organization are

NOT thoroughly vetted for security.

Page 8: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Stopped or Slowed Adoption

8

Source: The State of Cloud Security

Blue: Most recent data

Page 9: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Data Loss & Insecure Interfaces

9

Number of Cloud Vulnerability Incidents by Threat Ca tegory

Page 10: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Computing as a Service:

• Software as a Service (SaaS)

• Platform as a Service (PaaS)

• Infrastructure as a Service (IaaS)

What is Cloud Computing?

Delivered Internally or Externally to the Enterprise:

• Public

• Private

• Community

• Hybrid

10

Page 11: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Public Cloud

11

Page 12: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Public Cloud

12

Page 13: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Private Cloud

Outsourced Private Cloud

13

On-sitePrivate Cloud

Page 14: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

On-site Community Cloud

14

Page 15: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Outsourced Community Cloud

15

Page 16: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Hybrid Cloud

16

Page 17: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Software as a Service (SaaS)

Typically web accessed internet-based applications (“on-demand software”)

Platform as a Service (PaaS)

An internet-based computing platform and solution stack. Facilitates deployment of

Service Orchestration

Applications

17

solution stack. Facilitates deployment of applications at much lower cost and complexity

Infrastructure as a Service (IaaS)

Delivers computer infrastructure (typically a virtualized environment) along with raw storage and networking built-in

Page 18: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

The Conceptual Reference Model

18

Page 19: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Governance, Risk Management and Compliance

19

and Compliance

Page 20: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Governance, Risk Management and Compliance

20

Page 21: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Threat Vector Inheritance

21

Page 22: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Virtual machine guest hardening

Hypervisor security

Inter-VM attacks and blind spots

Performance concerns

Operational complexity from VM sprawl

Instant-on gaps

Virtualization Concerns in Cloud

Instant-on gaps

Virtual machine encryption

Data comingling

Virtual machine data destruction

Virtual machine image tampering

In-motion virtual machines

22

Page 23: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

How Security Gets Integrated

ApplicationsApplicationsApplicationsApplications

DataDataDataData

23

Page 24: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Mapping the Cloud Model to Security Control & Compliance

ApplicationsApplicationsApplicationsApplications

DataDataDataData

24

Page 25: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

25

Page 26: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

DataProtectionSolutions

26

Solutions

Page 27: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Where is Encryption Appliedto Protect Data in Cloud?

27

Page 28: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Rather than making the protection platform based, the security is applied directly to the data, protecting it wherever it goes, in any environment

How Data-Centric Protection Increases Security in Cloud Computing and Virtualization

Cloud environments by nature have more access points and cannot be disconnected – data-centric protection reduces the reliance on controlling the high number of access points

28

Page 29: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Encrypting the transfer of data to the cloud does not ensure the data is protected in the cloud

Once data arrives in the cloud, it should remain protected both at rest and in use

Do not forget to protect files that are often overlooked, but which frequently include sensitive information

Encryption Guidance from CSA

which frequently include sensitive information

• Log files and metadata can be avenues for data leakage

Encrypt using sufficiently durable encryption strengths (such as AES-256)

Use open, validated formats and avoid proprietary encryption formats wherever possible

29

Page 30: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Data Anonymization and De-identification

• This is where (for example) Personally Identifiable Information (PII) and Sensitive are stripped before processing.

Utilizing access controls built into the database

CSA: Look at Alternatives to Encryption

Utilizing access controls built into the database

30

Page 31: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

De-identification / Anonymization Field Real Data Tokenized / Pseudonymized

Name Joe Smith csu wusoj

Address 100 Main Street, Pleasantville, CA 476 srta coetse, cysieondusbak, CA

Date of Birth 12/25/1966 01/02/1966

Telephone 760-278-3389 760-389-2289

E-Mail Address [email protected] [email protected]

SSN 076-39-2778 076-28-3390

CC Number 3678 2289 3907 3378 3846 2290 3371 3378

Business URL www.surferdude.com www.sheyinctao.com

Fingerprint Encrypted

Photo Encrypted

X-Ray Encrypted

Healthcare / Financial Services

Dr. visits, prescriptions, hospital stays and discharges, clinical, billing, etc.Financial Services Consumer Products and activities

Protection methods can be equally applied to the actual data, but not needed with de-identification

31

Page 32: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

De-identification / Pseudonomization / Anonymization

Replaces real data with fake data – “Tokens”

Data is protected before it goes to the cloud

Benefits:

Data Tokenization

Benefits:

• Eliminates data residency issues

• Data remains usable in applications without modification

• Vaultless tokenization

• No data replication/collision issues,

• High scalability

32

Page 33: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Significantly Different Tokenization Approaches

Property Dynamic Pre-generated

Vault-based Vaultless

33

Page 34: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Increasing Pressure from International Data Protection Regulations – Use Case

Page 35: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Public Cloud – No Control

35

Consumers have no control over security once data is inside the public cloud. Completely reliant on provider for application and storage security.

Page 36: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Private Cloud – Limited Control

Outsourced Private Cloud

Consumer has limited capability to manage security within outsourced

36

On-sitePrivate Cloud

within outsourced IaaS private cloud.

Page 37: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Cloud Encryption Gateways • SaaS encryption

Cloud Security Gateways• Policy enforcement

Cloud Access Security Brokers (CASBs)

Cloud Gateways – Enterprise Control

Cloud Access Security Brokers (CASBs)

Cloud Services Brokerage (CSB)

Secure Email Gateways

Secure Web gateway

37

Page 38: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Public Cloud Gateway Example

GatewayAppliance

38

Page 39: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Cloud Gateway Example – Public Cloud

Cloud Gateway

039

Page 40: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Corporate Network

Security Gateway Deployment – Application Example

BackendSystem

CloudGateway

ExternalService

040

EnterpriseSecurity

AdministratorSecurity Officer

Page 41: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

High-Performance Gateway Architecture

Enterprise-extensible platform

Tokenization and encryption

Enterprise-grade key management

Flexible policy controls

Example of Cloud Security Gateway Features

Flexible policy controls

• File or Field Security

• Advanced function & usability preservation

Comprehensive activity monitoring & reporting

Support for internal, remote & mobile users

Multiple deployment options

41

Page 42: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Corporate Network

Security Gateway Deployment – Database Example

BackendSystem

CloudGateway

RDBMS

042

EnterpriseSecurity

AdministratorSecurity Officer

Page 43: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Corporate Network

BackendSystem

CloudGateway

Security Gateway Deployment – Indexing

RDBMS

Index

Query

re-write

043

EnterpriseSecurity

AdministratorSecurity Officer

IndexIndex

Page 44: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Corporate Network

BackendSystem

CloudGateway

Security Gateway Deployment – Search

RDBMSQuery

re-write

044

EnterpriseSecurity

AdministratorSecurity Officer

Order preserving encryption

Page 45: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Cloud Gateway - Requirements Adjusted Protection

Data Protection Methods Scalability Storage Security Tr ansparency

System without data protection

Weak Encryption (1:1 mapping)

Searchable Gateway Index (IV)

VaultlessTokenization

Partial EncryptionPartial Encryption

Data Type Preservation Encryption

Strong Encryption (AES CBC, IV)

Best Worst

45

Page 46: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Enterprise Data Security Policy

What is the sensitive data that needs to be protected.

How you want to protect and present sensitive data. There are several methods for protecting sensitive data. Encryption, tokenization, monitoring, etc.

Who should have access to sensitive data and who should not. Security access control. Roles & Users

What

Who

How

46

When should sensitive data access be granted to those who have access. Day of week, time of day.

Where is the sensitive data stored? This will be where the policy is enforced.

Audit authorized or un-authorized access to sensitive data.

When

Where

Audit

Page 47: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Centralized Policy Management - ExampleApplication

RDBMS

MPP

AuditLog

AuditLog

AuditLog

EnterpriseSecurity

Administrator

PolicyPolicyPolicyPolicyPolicyPolicyPolicyPolicyPolicy

Cloud

Security Officer

AuditLog

AuditLog

AuditLog

47

File Servers

Big Data

Gateway Servers

HP NonStopBase24

IBM Mainframe Protector

AuditLog

AuditLog Audit

Log

AuditLog

Protection Servers

AuditLog

AuditLog

Page 48: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Summary

What are the Concerns with Cloud?

How is Cloud Computing Defined?

What is the Guidance for Cloud Data Security?

What New Data Security Technologies are Available for Cloud?

48

Cloud?

How can Cloud Data Security work in Context to the Enterprise?

Page 49: Cloud data governance, risk management and compliance    ny metro joint cyber security conference 2014

Thank you!Thank you!

Questions?

Please contact us for more information

www.protegrity.com

[email protected]


Recommended