40

The Cloud Security Rules

Embed Size (px)

Citation preview

Page 1: The Cloud Security Rules
Page 2: The Cloud Security Rules

•The Roer Group: 1994

•Author & blogger

•Consulting, training and speaking worldwide

•Information securityand Risk Management

Page 3: The Cloud Security Rules
Page 4: The Cloud Security Rules

•Risk management

•Compliance and legal matters

•Humans

•Technology

•Business models

Page 5: The Cloud Security Rules
Page 6: The Cloud Security Rules

Source: http://en.wikipedia.org/wiki/Risk_management, 3rd June 2012

Page 7: The Cloud Security Rules

Risk is defined in ISO 31000 as the effect of uncertainty on objectives, whether positive or negative

Risk management is the identification, assessment, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability and /or impact of unfortunate events or to maximize the realization of opportunities.

Source: http://en.wikipedia.org/wiki/Risk_management, 3rd June 2012

Page 8: The Cloud Security Rules
Page 9: The Cloud Security Rules

Risk management requires

Page 10: The Cloud Security Rules

Risk management requires

•competence

Page 11: The Cloud Security Rules

Risk management requires

•competence

•resources

Page 12: The Cloud Security Rules

Risk management requires

•competence

•resources

Something most SME’s don’t have

Page 13: The Cloud Security Rules

• What are our risks when buying this service from this vendor?

• Can we accept those risks?• How will our cloud supplier(s) impact our

business contingency plan? • What if the cloud fail?

Page 14: The Cloud Security Rules

Plan for Cloud Fail!

Page 15: The Cloud Security Rules
Page 16: The Cloud Security Rules

•HIPAA

•SOx

•PCI-DSS

•The Patriot Act

•Basel I

•Basel II

•Basel III

•Gramm-Leach-Bliley

•Breach Notification Legislation

•Data Protection Directive

•The new EU Data Regulations

•FISMA

Page 17: The Cloud Security Rules

Any information connected to a person.

Data Protection Directive (Directive 95/46/EC)

Personal data are defined as “any information relating to an identified or identifiable natural person ("data subject"); an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity;" (art. 2 a)

Page 18: The Cloud Security Rules

•Most laws and regulations fail to recognize the service providers role, and assume that the owner of the data also controls the infrastructure.

Page 19: The Cloud Security Rules

•Where (country) do you store the data?

•Which jurisdiction controls your data?

•What and who have access to the data?

•Privacy regulations in EU != USA

Page 20: The Cloud Security Rules
Page 21: The Cloud Security Rules
Page 22: The Cloud Security Rules
Page 23: The Cloud Security Rules
Page 24: The Cloud Security Rules

• What training will our users need in order to successfully use the cloud service?

• How does the cloud service impact our policies?

• Are we ready for cloud? What will need to be changed to prepare us?

Page 25: The Cloud Security Rules
Page 26: The Cloud Security Rules
Page 27: The Cloud Security Rules
Page 28: The Cloud Security Rules

• What alternative cloud services are available to us?

• What impact will the cloud implementation have on our IT-department?

• Who is in charge of support?

Page 29: The Cloud Security Rules
Page 30: The Cloud Security Rules
Page 31: The Cloud Security Rules
Page 32: The Cloud Security Rules
Page 33: The Cloud Security Rules
Page 34: The Cloud Security Rules
Page 35: The Cloud Security Rules

•99% of companies in EU are SME

•most lack knowledge, understanding and competence for maintaining their own systems

•Cloud provides a more secure and cost-efficient solution to most of these companies

Page 36: The Cloud Security Rules
Page 37: The Cloud Security Rules

• How will the cloud provider sustain themselves and stay in business?

• How important is price vs customation to us?

• What kind of impact will the use of this service have on our business model?

• What can we change in our current business model to benefit from the cloud possibilities?

Page 38: The Cloud Security Rules
Page 39: The Cloud Security Rules

?

Page 40: The Cloud Security Rules

Kai [email protected]

http://roer.comTwitter: @kairoer