Cloud Security Guidance



Documents pareils
Information Security Management Lifecycle of the supplier s relation

ISO/IEC Comparatif entre la version 2013 et la version 2005

Le Cloud Computing est-il l ennemi de la Sécurité?

Qualité et ERP CLOUD & SECURITY (HACKING) Alireza MOKHTARI. 9/12/2014 Cloud & Security

How to Login to Career Page

Tom Pertsekos. Sécurité applicative Web : gare aux fraudes et aux pirates!

Frequently Asked Questions

en SCÈNE RATIONAL Rational Démonstration SDP : automatisation de la chaîne de développement Samira BATAOUCHE sbataouche@fr.ibm.com

Cycle de conférences sur Cloud Computinget Virtualisation. Cloud Computing et Sécurité Pascal Sauliere, Architecte, Microsoft France

F1 Security Requirement Check List (SRCL)

Les marchés Security La méthode The markets The approach

Paxton. ins Net2 desktop reader USB

AUDIT COMMITTEE: TERMS OF REFERENCE

Archived Content. Contenu archivé

Quick Start Guide This guide is intended to get you started with Rational ClearCase or Rational ClearCase MultiSite.

ITIL et les outils. À l ordre du jour. senté par Johanne L HeureuxL. Consultante. Mise en contexte Quelques exemples.

CEPF FINAL PROJECT COMPLETION REPORT

Cedric Dumoulin (C) The Java EE 7 Tutorial

APPENDIX 2. Provisions to be included in the contract between the Provider and the. Holder

Instructions Mozilla Thunderbird Page 1

Natixis Asset Management Response to the European Commission Green Paper on shadow banking

Opportunités s de mutualisation ITIL et ISO 27001

Application Form/ Formulaire de demande

RULE 5 - SERVICE OF DOCUMENTS RÈGLE 5 SIGNIFICATION DE DOCUMENTS. Rule 5 / Règle 5

Gestion des prestations Volontaire

First Nations Assessment Inspection Regulations. Règlement sur l inspection aux fins d évaluation foncière des premières nations CONSOLIDATION

Bitdefender GravityZone

APT / Cryptolockers. Pierre Poggi WatchGuard France pierre.poggi@watchguard.com

Editing and managing Systems engineering processes at Snecma

MELTING POTES, LA SECTION INTERNATIONALE DU BELLASSO (Association étudiante de lʼensaparis-belleville) PRESENTE :

Face Recognition Performance: Man vs. Machine

ICT7 Luxembourg. ICT7 Belgium. ICT7 France. 33 people. 12 people. 2 people

FOURNIR UN SERVICE DE BASE DE DONNÉES FLEXIBLE. Database as a Service (DBaaS)

Gestion du risque avec ISO/EIC17799

Jean-Nicolas Piotrowski, Dirigeant Fondateur d ITrust

Nouvelles de Swisscom Cloud Perspectives Cloud Computing

Sécurité des systèmes d exploitation

AMENDMENT TO BILL 32 AMENDEMENT AU PROJET DE LOI 32

Discours du Ministre Tassarajen Pillay Chedumbrum. Ministre des Technologies de l'information et de la Communication (TIC) Worshop on Dot.

English Q&A #1 Braille Services Requirement PPTC Q1. Would you like our proposal to be shipped or do you prefer an electronic submission?

La gestion des mots de passe pour les comptes à privilèges élevés

Accompagner nos clients vers.cloud. Nicolas Luneau Business Development Manager Symantec.cloud

Lieberman Software Corporation

Section I: Le Contexte du DATA CENTER Pourquoi l AGILITE est Nécessaire dans le DataCenter

L UNIVERS INSTANTANÉ:

accompagner votre transformation IT vers le Cloud de confiance

La sécurité des solutions de partage Quelles solutions pour quels usages?

Tier 1 / Tier 2 relations: Are the roles changing?

IPSAS 32 «Service concession arrangements» (SCA) Marie-Pierre Cordier Baudouin Griton, IPSAS Board

LES APPROCHES CONCRÈTES POUR LE DÉPLOIEMENT D INFRASTRUCTURES CLOUD AVEC HDS & VMWARE

Acce s aux applications informatiques Supply Chain Fournisseurs

Règlement sur le télémarketing et les centres d'appel. Call Centres Telemarketing Sales Regulation

La relation DSI Utilisateur dans un contexte d infogérance

CALCUL DE LA CONTRIBUTION - FONDS VERT Budget 2008/2009

COMPUTING. Jeudi 23 juin CLOUD COMPUTING I PRESENTATION

Engineered for Business: Oracle Hardware for Oracle Database

VMware : De la Virtualisation. au Cloud Computing

THE LAW SOCIETY OF UPPER CANADA BY-LAW 19 [HANDLING OF MONEY AND OTHER PROPERTY] MOTION TO BE MOVED AT THE MEETING OF CONVOCATION ON JANUARY 24, 2002

Gouvernance et nouvelles règles d organisation

Visualisation et Analyse de Risque Dynamique pour la Cyber-Défense

..seulement 5% des serveurs x86 sont virtualisés!

Approche Méthodologique de la Gestion des vulnérabilités. Jean-Paul JOANANY - RSSI

8. Cours virtuel Enjeux nordiques / Online Class Northern Issues Formulaire de demande de bourse / Fellowship Application Form

Notice Technique / Technical Manual

DOCUMENTATION - FRANCAIS... 2

Compléter le formulaire «Demande de participation» et l envoyer aux bureaux de SGC* à l adresse suivante :

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

L industrie pharmaceutique et la grippe aviaire

RSA ADVANCED SECURITY OPERATIONS CENTER SOLUTION

Cloud Computing: de la technologie à l usage final. Patrick CRASSON Oracle Thomas RULMONT WDC/CloudSphere Thibault van der Auwermeulen Expopolis

L'AUTHENTIFICATION FORTE EN TANT QUE SERVICE libérez-vous des contraintes matérielles

Innovative BI with SAP Jean-Michel JURBERT D. de Marché BI, HANA, BIG DATA _ SAP France

Release Status Date Written by Edited by Approved by FR_1.00 Final 19/03/2014

Cheque Holding Policy Disclosure (Banks) Regulations. Règlement sur la communication de la politique de retenue de chèques (banques) CONSOLIDATION

LE FORMAT DES RAPPORTS DU PERSONNEL DES COMMISSIONS DE DISTRICT D AMENAGEMENT FORMAT OF DISTRICT PLANNING COMMISSION STAFF REPORTS

Language requirement: Bilingual non-mandatory - Level 222/222. Chosen candidate will be required to undertake second language training.

Panorama des bonnes pratiques de reporting «corruption»

Nouveautés printemps 2013

Architectures informatiques dans les nuages

POLICY: FREE MILK PROGRAM CODE: CS-4

PROJET DE LOI. An Act to Amend the Employment Standards Act. Loi modifiant la Loi sur les normes d emploi

SERVEUR DÉDIÉ DOCUMENTATION

Private banking: après l Eldorado

Formulaire d inscription (form also available in English) Mission commerciale en Floride. Coordonnées

1. Formation F5 - Local Traffic Manager Configuring (LTM)

INFRASTRUCTURE À CLÉ PUBLIQUE DE CANAFE (ICP) Accord d abonnement ENTRE

If the corporation is or intends to become a registered charity as defined in the Income Tax Act, a copy of these documents must be sent to:

The new consumables catalogue from Medisoft is now updated. Please discover this full overview of all our consumables available to you.

I. COORDONNÉES PERSONNELLES / PERSONAL DATA

Grandes tendances et leurs impacts sur l acquisition de produits et services TI.

BELAC 1-04 Rev

INSCRIPTION MASTER / MASTER S APPLICATION

ETABLISSEMENT D ENSEIGNEMENT OU ORGANISME DE FORMATION / UNIVERSITY OR COLLEGE:

calls.paris-neuroscience.fr Tutoriel pour Candidatures en ligne *** Online Applications Tutorial

SCHOLARSHIP ANSTO FRENCH EMBASSY (SAFE) PROGRAM APPLICATION FORM

Edna Ekhivalak Elias Commissioner of Nunavut Commissaire du Nunavut

setting the scene: 11dec 14 perspectives on global data and computing e-infrastructure challenges mark asch MENESR/DGRI/SSRI - France

Name of document. Audit Report on the CORTE Quality System: confirmation of the certification (October 2011) Prepared by.

Transcription:

Cloud Security Guidance Décembre 2014 Tania Martin Smals Research www.smalsresearch.be

1 Agenda Le cloud et sa sécurité 2 3 Modèle d évaluation Governance Identity and access management IT security Operational security 4 Exemple: Dropbox for Business Choisir un service cloud 5 Conclusion 2/83

Le cloud et sa sécurité

Aperçu du cloud 4/83

Modèles de service cloud SaaS PaaS IaaS REF Voc: CSP (Cloud Service Provider) 5/83

5 caractéristiques essentielles broad network access rapid elasticity measured service ondemand self-service resource pooling Accès au service via tout type de machine Service quasi-automatiquement approvisionné Optimisation automatique des ressources Self-service de l utilisateur Ressources partagées par plusieurs tenants Voc: tenant = client (entreprise/particulier) Ref: NIST Special Publication 800-145 REF 6/83

Modèles de déploiement Public Community Private Off-premises Off-premises/On-premises Voc: off-premises = hors-site on-premises = sur-site Off-premises/On-premises 7/83

Et la sécurité du cloud dans tout ça? 8/83

Le cloud: safe & secure? Usage Stockage de codes source A retenir Contrôler la chaine de sous-traitance Bonne séparation des rôles/pouvoirs Attaque Prise de contrôle de l interface admin (sous Amazon WS) Effacement des données (backup compris) 9/83

Le cloud: safe & secure? Usage Location de serveur Création de machines virtuelles Attaque Auto update des nouveaux serveurs est DESACTIVEE par défaut Image serveur de Windows 2003 date d octobre 2009 A retenir Produits toujours up-to-date Security-by-design 10/83

Le cloud: safe & secure? Usage Stockage de données Email + agenda A retenir Authentification 2-factor indispensable pour des données sensibles Avoir un bon mot de passe Attaque Faille de conception dans «Find my iphone» Brute force sur les passwords (sans alerte ni lockout) 11/83

Et la sécurité du cloud dans tout ça? Pas 100% assurée par les services cloud Problématique pour des données sensibles Surtout dans notre contexte «sécurité sociale et ehealth» Evaluer la sécurité d un service cloud avant utilisation 12/83

Durant cette présentation Parcourir les points-clé de la sécurité du cloud Modèle d évaluation de sécurité des services cloud + Dropbox for Business 13/83

Modèle d évaluation

But du modèle Aide pour les experts en sécurité Modèle pratique «Quel service cloud puis-je utiliser si je souhaite y mettre un type X de données?» 15/83

But du modèle Aide pour les experts en sécurité Modèle pratique Eliminer/filtrer les pistes non fructueuses «Quel service cloud puis-je utiliser si je souhaite y mettre un type X de données?» Sélectionner les candidats potentiels 16/83

Composantes du modèle 4 critères majeurs Governance Identity and Access Management IT Security Operational Security Cloud Policy de la sécurité sociale Type de données 2 questionnaires Evalue le niveau de sécurité d un service cloud Evalue la possibilité d utiliser un service cloud 17/83

Composantes du modèle 4 critères majeurs Governance Identity and Access Management IT Security Operational Security Cloud Policy de la sécurité sociale Type de données 2 questionnaires Evalue le niveau de sécurité d un service cloud Evalue la possibilité d utiliser un service cloud 18/83

A quoi ressemble le modèle? Dropbox for Business 19/83

Governance

Implications légales Quelles lois appliquent sur les données? Not OK!!! REF 21/83

Chaine de sous-traitance CSP toujours responsable de ses engagements contractuels?! 22/83

Audit Tous les 6 mois 10 /10 Tous les ans 23/83

Méta-données extrait? Méta-données utilisées seulement pour le service cloud?! 24/83

Qualité du service Plan de business continuity SLA Réversibilité du service 25/83

Exemple: Dropbox for Business 26/83

Exemple: Dropbox for Business Category Title Score Minimal weighted score Maximal weighted score 1 Governance 41% 66% 1.1 Legal implication 6% 11% 1.1.1 What is the physical location of data-at-rest? Unknown 5,25 21 1.1.2 Which jurisdiction is the CSP subject to? US 10,5 10,5 1.1.3 Can the CSP accomodate with the tenant's data retention requirements? Unknown 0 8 1.1.4 Can the data be given to governments if requested for judicial requirements without informing the tenant or without constitutional guarantees? Yes 0 0 1.1.5 Can the data be given to, shared with third parties, or used by the CSP for other purposes than the cloud service without the tenant s consent? Yes 0 0 1.1.6 If the US-EU Safe Harbor applies, is the CSP registered? Yes 8 8 1.2 Supply chain management 18% 22% 1.2.1 Does the CSP use subcontrators? Yes 40 40 1.2.2 If so, will the CSP inform the tenant of the subcontractors hired to provide the cloud service? Yes 20 20 1.2.3 If so, will the CSP inform the tenant of any change in the course of the contract? Yes 20 20 1.2.4 If so, does the CSP guarantee contractually to remain fully responsible for his engagements, even with the hiring of subcontractors? Unknown 0 20 1.3 Audit 10% 10% 1.3.1 At which time interval is the cloud service (including all its subcontractors) audited by a third party? 1 year 12,75 12,75 1.3.2 If the cloud service is audited, are the scopes of the audits accurately defined? Yes 32 32 1.3.3 At which time interval is the cloud service (including all its subcontractors) pen-tested? 1 year 5,95 5,95 1.3.4 Did the cloud service define an ISP (Information Security Policy) and obtain a security-related certification? Yes, ISP and certificate(s) 14 14 1.3.5 Is there a Tier certification of data centers (especially for physical availability and security) or equivalent certification? No Tier certification or equivalent 0 0 1.4 Business continuity 0% 8% 1.4.1 Is the cloud service delivery managed under SLAs (Service Level Agreements)? No 0 0 1.4.2 Does the CSP define and implement a business continuity plan? Unknown 0 33 1.4.3 Is the reversibility of the cloud service provided? No 0 0 1.5 Others 8% 15% 1.5.1 Does the CSP apply a segregation of duties in the CSP organization to protect the tenants? Unknown 0 50 1.5.2 If meta-data are extracted by the CSP from the process of tenant's data, are they used for the cloud service only? Yes 50 50 27/83

Exemple: Dropbox for Business Worst case Best case 28/83

Exemple: Dropbox for Business 29/83

Exemple: Dropbox for Business 30/83

Governance: à retenir Quelles lois? Sous-traitance fiable? Audit régulier? Non abus des méta données? Bonne qualité du service? 31/83

Identity and Access Management

Niveau d authentification Username + Password! Username + Password + Token Username + Password + Certificat Username + Password + Certificat/Token + Location 10 /10 33/83

Niveau d authentification Authentification «2-factor» Username + Password + Token Username + Password + Certificat Username + Password + Certificat/Token + Location 10 /10 34/83

Gestion des utilisateurs! 10 /10 trusted 35/83

Bien défini Refusé Accès aux données 36/83

Exemple: Dropbox for Business Category Title Score Minimal weighted score Maximal weighted score 2 Identity and Access Management (IAM) 64% 72% 2.1 Authentication level 31% 31% 2.1.1 Are the different authentication mechanisms to access the cloud service documented? Yes 36 36 2.1.2 What is the strongest authentication mechanism to access the cloud service as a tenant system administrator offered by the CSP? 2.1.3 What is the strongest authentication mechanism to access the cloud service as a tenant user offered by the CSP? Username + password + token (e.g. with SMS) 12 12 Username + password + token (e.g. with SMS) 12 12 2.1.4 Are password policy enforcements well-defined and implemented? Yes 16 16 2.1.5 Are secure password reset procedures well-defined and implemented? Yes 16 16 2.2 User management 33% 33% 2.2.1 Who performs the tenants user management? Tenant system administrator 22 22 2.2.2 Is the integration with the IAM of the tenant possible? Yes 35 35 2.2.3 Is the integration with an ID-provider possible? Yes 28 28 2.2.4 Are the identification and/or authentication of the devices used to access the cloud service possible as additional enforcement of the IAM? Yes 15 15 2.3 Access management 0% 7% 2.3.1 Does the CSP document how the IAM of its employees related to the tenants assets is performed? No 0 0 2.3.2 Is data access of {tenant user, tenant system administrator, CSP system administrator} clearly No 0 0 defined? 2.3.3 Is data access of {CSP employees, third party, other tenants} denied? No 0 0 2.3.4 Is IAM management and data access logging clearly defined and available? Unknown 0 22 37/83

Exemple: Dropbox for Business 38/83

IAM: à retenir Authentification «2-factor»? Gestion des utilisateurs controlée? Accès aux données bien défini? 39/83

1 Agenda Le cloud et sa sécurité 2 3 Modèle d évaluation Governance Identity and access management IT security Operational security 4 Exemple: Dropbox for Business Choisir un service cloud 5 Conclusion 41/83

IT Security

Standards de sécurité OS Anti-virus, anti-malwares Patch management process Environnement d acceptation Infra physique + virtuelle Sécurité réseau: firewall, APT detection tools REF Monitoring: IDS/IPS, file integrity Détection des fuites: DLP Protection des hyperviseurs et consoles d administration Effacement securisé des données: crypto wiping, démagnétisation Interface Intégrité et sécurité des données en input et output API développées en suivant les standards (e.g. OWASP) REF 43/83

Ségrégation des données Private Community Off-premises/On-premises Off-premises/On-premises! Point très important MAIS souvent pas documenté 44/83

Cryptographie Confidentialité vis-à-vis du CSP chiffrement Crypto forte??? Outils: REF Confidentialité chiffrement Intégrité hash, signature digitale?????? 45/83

Gestion des clés Chez le CSP + = Chez l utilisateur! J ai oublié/perdu ma. Mes données sont irrécupérables!!! Chez le sysadmin ou TTP?????? 46/83

Exemple: Dropbox for Business Category Title Score Minimal weighted score Maximal weighted score 3 IT Security 37% 76% 3.1 Segregation of data 0% 16% 3.1.1 Can the cloud service be provided as private or community? No 0 0 3.1.2 In a multi-tenant system, are the data of the respective tenants segregated/isolated in such a way that it is technically impossible for any user of tenant A to receive entitlements to data of tenant B? Unknown 0 62 3.2 Interface security 7% 12% 3.2.1 Are APIs developed in accordance with standards? Unknown 0 40 3.2.2 Are data integrity and security ensured for input and output? Yes 60 60 3.3 Infrastructure and virtualization security 14% 22% 3.3.1 Is the access to hypervisors management functions and administration consoles highly controlled? Unknown 0 14 3.3.2 Is data securely deleted from all storage media when the user s or tenant s account is deleted? Yes 17 17 3.3.3 Does the CSP take defense-in-depth approach to wired or wireless network security? Yes 23 23 3.3.4 Are sufficient controls in place at the hardware and virtual (if applicable) levels? Yes 23 23 3.3.5 Are security mechanisms to prevent and analyze data leakage at the hardware and virtual (if applicable) levels available? Unknown 0 23 3.4 OS security (only for SaaS and PaaS cloud services) 10% 18% 3.4.1 Are tools to prevent, detect and mitigate viruses and malwares at server stations available? Yes 40 40 3.4.2 Is hardening process performed on the server stations? Unknown 0 30 3.5 Cryptography 6% 9% 3.5.1 Who is in charge of the key management? CSP 2,7 2,7 3.5.2 Has the key management been defined through policies and procedures as required by the ISO/IEC27002:2013 standard? No 0 0 3.5.3 Have the cryptographic mechanisms used for the cloud service been defined to guarantee adequate cryptographic strength? Yes 13 13 3.5.4 Does the CSP use HSMs (Hardware Security Modules) for the protection of keys? No 0 0 3.5.5 Is client-side encryption of data possible? No 0 0 3.5.6 Is data-at-rest confidentiality ensured? Yes 19 19 3.5.7 Is data-at-rest integrity ensured? Unknown 0 19 47/83

Exemple: Dropbox for Business 48/83

IT security: à retenir Standards de sécurité en place? Ségrégation des données? Standards de cryptographie utilisés? Confidentialité et intégrité des données? Gestion des clés crypto chez le sysadmin? 49/83

Operational Security

Backup et disaster recovery Plan de backup adaptable Hey je veux des backups pour mes données! Pas de problème! Nous avons: Plan A Plan B Plan C Plan de disaster recovery No panic!!! We have: Quelques chiffres sur les RTO et RPO 1 semaine 1 jour! 1 heure 10 /10 Voc: RTO (Recovery Time Objective), RPO (Recovery Point Objective) 51/83

Incident management Log forensics Log collection User activity monitoring Log retention Incident management adéquat Préparation IT compliance SIEM File integrity monitoring Mitigation Réponse REF Event correlation Dashboards Reprise Formation sécurité des employés REF 52/83

Exemple: Dropbox for Business Category Title Score Minimal weighted score Maximal weighted score 4 Operational Security 20% 66% 4.1 Backup and disaster recovery 0% 14% 4.1.1 Can the backup retention plan be defined by the tenant? No 0 0 4.1.2 Are backup controls defined and adequate? No 0 0 4.1.3 What it the RTO (Recovery Time objective) of the cloud service? Unknown 0 15 4.1.4 What it the RPO (Recovery Point objective) of the cloud service? Unknown 0 15 4.1.5 Are tenants able to perform recovery tests, including reporting? Unknown 0 10 4.2 Incident management 20% 20% 4.2.1 Does the CSP have a SIEM (Security Information and Event Management) for analyzing the security alerts and data logs? 4.2.2 Does the CSP have an adequate incident management procedure for managing and minimizing the impact of security incidents on tenants data? No 0 0 Yes 40 40 4.2.3 Does the CSP have adequate security policies and procedures regarding CSP employee security? Yes 20 20 4.3 Vulnerability management 0% 33% 4.3.1 Is there a documented patch management process implemented in the cloud service? Unknown 0 50 4.3.2 Does the CSP test patches in acceptance environments prior to deployment? Unknown 0 50 53/83

Exemple: Dropbox for Business 54/83

Operational security: à retenir Plan de backup adaptable? RTO et RPO < 1 jour? SIEM? Gestion d incident adéquate? Formation sécurité des employés? 55/83

Exemple: Dropbox for Business

Résultat préliminaire de l analyse Minimal Maximal weighted weighted score score Governance 41% 66% IAM 64% 72% IT Sec 37% 76% Ope Sec 20% 66% 57/83

Cloud policy de la sécurité sociale But? Etablit les exigences de sécurité quand une institution de la sécurité sociale envisage d utiliser un service cloud URL? QR code de l URL REF Modèle? Chaque point est restitué dans le modèle Mais le modèle va un peu plus loin 58/83

Cloud policy dans le modèle Category Title Score Minimal weighted score Maximal weighted score 1 Governance 41% 66% 1.1 Legal implication 6% 11% 1.1.1 What is the physical location of data-at-rest? Unknown 5,25 21 1.1.2 Which jurisdiction is the CSP subject to? US 10,5 10,5 1.1.3 Can the CSP accomodate with the tenant's data retention requirements? Unknown 0 8 1.1.4 Can the data be given to governments if requested for judicial requirements without informing the tenant or without constitutional guarantees? Yes 0 0 1.1.5 Can the data be given to, shared with third parties, or used by the CSP for other purposes than the cloud service without the tenant s consent? Yes 0 0 1.1.6 If the US-EU Safe Harbor applies, is the CSP registered? Yes 8 8 1.2 Supply chain management 18% 22% 1.2.1 Does the CSP use subcontrators? Yes 40 40 1.2.2 If so, will the CSP inform the tenant of the subcontractors hired to provide the cloud service? Yes 20 20 1.2.3 If so, will the CSP inform the tenant of any change in the course of the contract? Yes 20 20 1.2.4 If so, does the CSP guarantee contractually to remain fully responsible for his engagements, even with the hiring of subcontractors? Unknown 0 20 1.3 Audit 10% 10% 1.3.1 At which time interval is the cloud service (including all its subcontractors) audited by a third party? 1 year 12,75 12,75 1.3.2 If the cloud service is audited, are the scopes of the audits accurately defined? Yes 32 32 1.3.3 At which time interval is the cloud service (including all its subcontractors) pen-tested? 1 year 5,95 5,95 1.3.4 Did the cloud service define an ISP (Information Security Policy) and obtain a security-related certification? Yes, ISP and certificate(s) 14 14 1.3.5 Is there a Tier certification of data centers (especially for physical availability and security) or equivalent certification? No Tier certification or equivalent 0 0 1.4 Business continuity 0% 8% 1.4.1 Is the cloud service delivery managed under SLAs (Service Level Agreements)? No 0 0 1.4.2 Does the CSP define and implement a business continuity plan? Unknown 0 33 1.4.3 Is the reversibility of the cloud service provided? No 0 0 1.5 Others 8% 15% 1.5.1 Does the CSP apply a segregation of duties in the CSP organization to protect the tenants? Unknown 0 50 1.5.2 If meta-data are extracted by the CSP from the process of tenant's data, are they used for the cloud service only? Yes 50 50 59/83

Cloud policy dans le modèle Category Title Score Minimal weighted score Maximal weighted score 1 Governance 41% 66% 1.1 Legal implication 6% 11% 1.1.1 What is the physical location of data-at-rest? Unknown 5,25 21 1.1.2 Which jurisdiction is the CSP subject to? US 10,5 10,5 1.1.3 Can the CSP accomodate with the tenant's data retention requirements? Unknown 0 8 Compliance with cloud policy 1.1.4 Can the data be given to governments if requested for judicial requirements without informing the tenant or without constitutional guarantees? Yes 0 0 X 1.1.5 Can the data be given to, shared with third parties, or used by the CSP for other purposes than the cloud Yes service without the tenant s consent? 0 0 X 1.1.6 If the US-EU Safe Harbor applies, is the CSP registered? Yes 8 8 1.2 Supply chain management 18% 22% 1.2.1 Does the CSP use subcontrators? Yes 40 40 1.2.2 If so, will the CSP inform the tenant of the subcontractors hired to provide the cloud service? Yes 20 20 V 1.2.3 If so, will the CSP inform the tenant of any change in the course of the contract? Yes 20 20 V 1.2.4 If so, does the CSP guarantee contractually to remain fully responsible for his engagements, even with Unknown 0 20?? the hiring of subcontractors? 1.3 Audit 10% 10% 1.3.1 At which time interval is the cloud service (including all its subcontractors) audited by a third party? 1 year 12,75 12,75 V 1.3.2 If the cloud service is audited, are the scopes of the audits accurately defined? Yes 32 32 V 1.3.3 At which time interval is the cloud service (including all its subcontractors) pen-tested? 1 year 5,95 5,95 V 1.3.4 Did the cloud service define an ISP (Information Security Policy) and obtain a security-related certification? 1.3.5 Is there a Tier certification of data centers (especially for physical availability and security) or equivalent certification? Yes, ISP and certificate(s) No Tier certification or equivalent 14 14 V 0 0 X 1.4 Business continuity 0% 8% 1.4.1 Is the cloud service delivery managed under SLAs (Service Level Agreements)? No 0 0 X 1.4.2 Does the CSP define and implement a business continuity plan? Unknown 0 33?? 1.4.3 Is the reversibility of the cloud service provided? No 0 0 X 1.5 Others 8% 15% 1.5.1 Does the CSP apply a segregation of duties in the CSP organization to protect the tenants? Unknown 0 50 1.5.2 If meta-data are extracted by the CSP from the process of tenant's data, are they used for the cloud service only? Yes 50 50 60/83

Visualisation de la conformité Minimal weighted score Maximal weighted score Compliance with cloud policy Governance 41% 66% IAM 64% 72% IT Sec 37% 76% Ope Sec 20% 66% 61/83

Minimal Maximal weighted weighted score score Governance 41% 66% IAM 64% 72% IT Sec 37% 76% Ope Sec 20% 66% Résultat complet de l analyse 62/83

Minimal Maximal weighted weighted score score Governance 31% 68% IAM 34% 41% IT Sec 16% 76% Ope Sec 7% 66% Et Dropbox Free alors? 63/83

Minimal Maximal weighted weighted score score Governance 31% 68% IAM 34% 41% IT Sec 16% 76% Ope Sec 7% 66% Et Dropbox Free alors? 64/83

Choisir un service cloud

But du modèle Aide pour les experts en sécurité Modèle pratique Eliminer/filtrer les pistes non fructueuses «Quel service cloud puis-je utiliser si je souhaite y mettre un type X de données?» Sélectionner les candidats potentiels 66/83

Comment choisir un bon candidat? 1 2 3 Experts analysent des services cloud Résultats sont diffusés Client fait une auto-évaluation de ses besoins/exigences Client compare: / = 67/83

Auto-évaluation Quel type de données? Quel niveau de sécurité? 68/83

Auto-éval: quel type de données? Publiques https://www.ksz.fgov.be/ Internes Confidentielles Financial Roadmap Comptesrendus Personnelles Sociales Médicales NISS Ref: Data classification policy de la sécurité sociale REF 69/83

Auto-éval: quel niveau de sécurité? Governance IAM IT Security Operational Security Question 1? Question 2? Question 1? Question 2? Question 1? Question 2? Question 1? Question 2? High Medium Low 70/83

Auto-éval: quel niveau de sécurité? Governance Question 1? Question 2? Required score IAM Question 1? Question 2? Required score IT Security Question 1? Question 2? Required score Operational Security Question 1? Question 2? Required score 71/83

Ex: stockage des fiches de salaire Category Title Score Required score 0 Data Type 0.1 What type of data is intended to be moved to a cloud service? Personal Explanations / Examples The choices of data type are extracted from the Data Classification Policy of the Social Security. Score specification Public e.g. web site of BCSS/KSZ Internal to the company e.g. internal strategy, agenda, contact, email Confidential of the company e.g. financial roadmap Personal e.g. HR personal folder Personal and social e.g. National register data Medical e.g. medical record 1 Governance 75% 1.1 Which level of governance must be attained by the cloud service? High 75 2 Identity and Access Management (IAM) 78% 2.1 Which level of authentication must be offered by the cloud service? High 28,9 2.2 Which level of control on the user management must be proposed by the cloud service? High 24,75 2.3 Which level of access management must be provided by the cloud service? High 24,75 3 IT Security 68% 3.1 Which deployment model must be provided by the cloud service? Community cloud 16,5 3.2 Which level of interface security must be provided by the cloud service? High 12 3.3 Which level of infrastructure and virtualization security must be achieved by the cloud service? High 22,5 3.4 Which level of cryptography must be provided by the cloud service? High 16,8 4 Operational Security 75% 4.1 Which level of backup and disaster recovery must be provided by the cloud service? High 37,5 4.2 Which level of incident management must be provided by the cloud service? High 37,5 72/83

Ex: stockage des fiches de salaire 73/83

Ex: stockage des fiches de salaire Minimal Maximal Does Required weighted weighted score score score Governance 41% 66% 75% DOES NOT satisfy IAM 64% 72% 78% DOES NOT satisfy IT Sec 37% 76% 68% MAY satisfy Ope Sec 20% 66% 75% DOES NOT satisfy Dropbox for Business satisfy the required score? DOES NOT SATISFY 74/83

Ex: stockage des fiches de salaire Minimal Maximal Does Required weighted weighted score score score Governance 65% 83% 75% MAY satisfy IAM 97% 97% 78% DOES satisfy IT Sec 58% 81% 68% MAY satisfy Ope Sec 63% 73% 75% DOES NOT satisfy Office 365 for Business satisfy the required score? DOES NOT SATISFY 75/83

Ex: stockage des fiches de salaire 76/83

Ex: stockage des fiches de salaire 77/83

Ex: stockage des fiches de salaire Relaxing the requirements: Office 365 for Business MAY SATISFY 78/83

Conclusion

Conclusion Sécurité du cloud cruciale Proposition d un outil d évaluation: le modèle Surtout si on souhaite y mettre des données sensibles! Importance d évaluer la sécurité d un service cloud Un expert humain est le seul vrai juge du résultat 80/83

Où trouver le modèle? Version FR Version NL URL? REF Pour qui? Experts et conseillers en sécurité 81/83

Quelques REF intéressantes Koen Vanderkimpen and Bert Vanhalst, Application Platform as a Service NIST, Special Publication 800-145 The NIST Definition of Cloud Computing U.S. Government, The PATRIOT Act Tania Martin, Research Note 32: Advanced Persistent Threats - Etat de l'art OWASP, The OWASP Project Kristof Verslype, Quick Review 65: BoxCryptor - Client-side encryptie voor FSS Kristof Verslype, Research Note 26: Security Information & Event Management (SIEM) Tania Martin, Social engineering : watch out because there is no patch for human stupidity Sécurité sociale, Politique de sécurité relative à des services de Cloud Computing Sécurité sociale, Policy dataclassification Smals Research, Modèle d évaluation de sécurité cloud Smals Research, Cloud security evaluatiemodel 82/83

Tania Martin 02 787 56 05 tania.martin@smals.be Smals www.smals.be @Smals_ICT www.smalsresearch.be @SmalsResearch 83/83