SlideShare a Scribd company logo
BESTT	Group	Meeting
Best-practice:	protecting	security	&	privacy	on	the	cloud
Public release
Security
Privacy
AuditCloud	Security	&	Privacy
+	Security	Landscape	of	2017
©	ACinfotec	2017	|	www.acinfotec.com Page	2
Security	landscape	of	2017	and	beyond
Best	practice	for	securing	the	cloud
Best	practice	for	for	Protecting	Privacy	in	the	Cloud
Cloud	assurance	&	audit
Agenda
Key	takeaway
Source: The Global Risk Landscape 2016,
World Economic Forum
Cyber	attacks	are	among	Top	10	Risks
WEFORUM:	Global	Risk	Landscape	2016
Summary	of	2017	Cyber	Threat	Landscape
§ Advanced	Threats	Targeting	the	Cloud
§ Evolution	of	Ransomware:	Changing	Data	and	Destroying	Backups
§ GDPR	Compliance	Approaching
§ Increased	Demand	for	Cyber	Insurance
§ Shadow	IT
§ Cyber	Espionage	and	Warfare
§ Dronejacking
§ IoT Malware
§ Hacktivists	exposing	privacy	issues
2017	Cyber	Security	Trends	in	Thailand
§ Cyber	security	regulations	improvement
§ More	demand	for	cyber	security	skills
§ Attackers	will	target	consumers
§ Attackers	will	become	more	bolder,	more	commercial	
and	less	traceable
§ Breaches	will	get	more	complicated	and	harder	to	beat
RISKS
CLOUD	COMPUTING
©	ACinfotec	2017	|	www.acinfotec.com Page	7
Sensitive	Data	in	the	Cloud
Source:	Cloud	Adoption	&	Risk	Report	Q4/2015	by	Skyhigh
©	ACinfotec	2017	|	www.acinfotec.com Page	8
Cloud	Services	Lack	of	Basic	Security	Features
Source:	Cloud	Adoption	&	Risk	Report	Q1/2014	by	Skyhigh
©	ACinfotec	2017	|	www.acinfotec.com Page	9
CSA	Top	Threats:	Notorious	Nine
1. Data	Breaches
2. Data	Loss
3. Account	Hijacking
4. Insecure	APIs
5. Denial	of	Service
6. Malicious	Insiders
7. Abuse	of	Cloud	Services
8. Insufficient	Due	Diligence
9. Shared	Technology	Issues
Source:	https://cloudsecurityalliance.org/group/top-threats/
Best Practice
for Securing the Cloud
©	ACinfotec	2017	|	www.acinfotec.com Page	11
Guideline	for	Implementing	Security	Controls	in	the	Cloud
• Controls	derived	from	
guidance
• Mapped	to	familiar	
frameworks:	ISO	27001,	
PCI,	COBIT
• Applicable	to	IaaS,	PaaS,	
SaaS
• Customer	vs Provider	
roles
• Help	bridges	the	gap	for	
IT	and	IT	Auditor
©	ACinfotec	2017	|	www.acinfotec.com Page	12
CCM	v3.0.1	Details
©	ACinfotec	2017	|	www.acinfotec.com Page	13
Consensus	Assessment	Initiatives
§ Self-assessment	questionnaire,	which	can	be	used	to	assess	cloud	security
§ Latest	version	is	v3.0.1	covering	16	governing	&	operating	domains	aligned	with	CCM	
https://cloudsecurityalliance.org/group/consensus-assessments/
§ Main	mechanism	to	be	listed	in	CSA	STAR	registry	(see	later	slide)
©	ACinfotec	2017	|	www.acinfotec.com Page	14
Security	Guidance	for	Critical	Areas	of	Focus	in	Cloud	Computing	V3.0
Source:	https://cloudsecurityalliance.org/download/security-
guidance-for-critical-areas-of-focus-in-cloud-computing-v3/
Controls
CLOUD	COMPUTING
//	Other	Potential	Standards	//
©	ACinfotec	2017	|	www.acinfotec.com Page	16
NIST	SP	800-144
Guidelines	on	Security	and	Privacy	in	Public	Cloud	Computing
Source:	
http://csrc.nist.gov/publications/nistpubs/800-
144/SP800-144.pdf
©	ACinfotec	2017	|	www.acinfotec.com Page	17
NIST	SP	800-144
Security	and	Privacy	Issues	and	Recommendations
©	ACinfotec	2017	|	www.acinfotec.com Page	18
NIST	SP	800-144
9	Domains
80+	pages
©	ACinfotec	2017	|	www.acinfotec.com Page	19
ISO	27017	Cloud	Security
Code	of	practice	for	security	controls	based	on	ISO/	IEC	27002	for	cloud	services
• Cloud-specific,	ISO	standard
• provide	the	necessary	guidance	
on	information	security	controls	
for	the	cloud
• Supplemental	to	ISO	27001,	
ISO	27002	and	ISO	27018
• Can	be	used	by	both	Cloud	users	
and	Cloud	providers
©	ACinfotec	2017	|	www.acinfotec.com Page	20
ISO	27017	Cloud	Security
Introducing	ISO	27017
§ The objectives of this International Standard are to provide a security control framework and
implementation guidance for both cloud service customers and cloud service providers.
§ The guidelines of this International Standard include identification of risks and associated
controls for the use of cloud services..
ISO	27017
Controls	based	on	ISO	27002
ISO	27002	
controls
ISO	27017
Annex	A
Provided	specific	guidance
for	cloud	service	customers	
and	cloud	service	providers	
base	on	ISO	27002	controls
Provided	extended	control	
set	for	securing	the	cloud
Specific	guidance	
for	cloud
©	ACinfotec	2017	|	www.acinfotec.com Page	21
ISO	27017	Cloud	Security
Specific	Guidance	based	on	ISO	27002	Controls
ISO	27017
Controls	based	on	ISO	27002
ISO	27002	
controls
Specific	guidance	
for	cloud
©	ACinfotec	2017	|	www.acinfotec.com Page	22
ISO	27017	Cloud	Security
Extended	control	set	for	securing	the	cloud
ISO	27017
Annex	A
©	ACinfotec	2017	|	www.acinfotec.com Page	23
ISO	27017	Cloud	Security
Guidance	for	security	risk	related	to	cloud	computing
ISO	27017
Annex	B
Best Practice
for Protecting Privacy in the Cloud
©	ACinfotec	2017	|	www.acinfotec.com Page	25
ISO	27018	Public	Cloud	Privacy
Code	of	practice	for	protection	of	PII	in	public	clouds	acting	as	PII	processors
• Published	on	August	2014
• Cloud-specific,	ISO	standard
• Based	on	privacy	principles	
defined	in	ISO	29100
• Govern	how	users’	personally	
identifiable	information	(PII)	
should	be	protected	by	cloud	
providers
• Supplemental	to	ISO	27001	and
ISO	27002
©	ACinfotec	2017	|	www.acinfotec.com Page	26
ISO	27018	Public	Cloud	Privacy
Introducing	ISO	27018
§ Typically an organization implementing ISO/IEC 27001 is protecting its own information
assets. However, in the context of PII protection requirements for a public cloud service
provider acting as a PII processor, the organization is protecting the information assets
entrusted to it by its customers.
ISO	27018
Annex	A
Provided specific
guidance for protecting
PII base on ISO 27001
controls
Provided additional
controls for protecting
PII base on ISO 29100
principle
ISO	27018
Controls	based	on	ISO	27002
ISO	27002	
controls
Specific	guidance	
for	privacy	in	the	
cloud
©	ACinfotec	2017	|	www.acinfotec.com Page	27
ISO	27018	Public	Cloud	Privacy
Specific	Guidance	based	on	ISO	27001	Controls
ISO	27018
Controls	based	on	ISO	27002
ISO	27002	
controls
Specific	guidance	
for	privacy	in	the	
cloud
©	ACinfotec	2017	|	www.acinfotec.com Page	28
ISO	27018	Public	Cloud	Privacy
Additional	controls	base	on	ISO	29100	principle
ISO	27018
Annex	A
Assurance	&	Audit
CLOUD	COMPUTING
©	ACinfotec	2017	|	www.acinfotec.com Page	30
CSA	STAR	(Security,	Trust	and	Assurance	Registry)
Source:	www.cloudsecurityalliance.org/star
©	ACinfotec	2017	|	www.acinfotec.com Page	31
What	is	CSA	STAR?
§ Public	and	free	registry	of	Cloud	Provider	self	assessments,	demonstrating	
adoption	of:
§ Cloud	Control	Matrix	(CCM)
§ Consensus	Assessments	Initiative	Questionnaire	(CAIQ)
§ Promoting	transparency
§ Free	market	competition	to	provide	quality	assessment
§ Available	on	October	2011
©	ACinfotec	2017	|	www.acinfotec.com Page	32
CSA	STAR	– What’s	On
©	ACinfotec	2017	|	www.acinfotec.com Page	33
CSA	STAR	– What’s	On
©	ACinfotec	2017	|	www.acinfotec.com Page	34
CSA	STAR	Listing	Process
Level	1	– Self-Assessment
§Cloud	Provider	fills	out	CAIQ	or	customizes	CCM
§Uploads	document	at	CSA	STAR	website
§CSA	performs	basic	verification
§CSA	digitally	signs	and	post	at	STAR
§Free	of	charge
§Listing	expire	within	1	year
©	ACinfotec	2017	|	www.acinfotec.com Page	35
CSA	STAR	Certification
Level	2	– Certification
§Base	on	ISO	27001:2013	with	CSA	CCM	as	additional	or	
compensating	controls
§Measures	the	capability	levels of	the	cloud	service	provider
§Evaluates	the	efficiency	of	an	organization’s	ISMS	and	ensure	the	
scope,	processes	and	objectives	are	“Fit	for	Purpose”
§Based	on	the	PDCA model
©	ACinfotec	2017	|	www.acinfotec.com Page	36
CSA	STAR	Certification
§A	STAR	Certification	Certificate	cannot	be	issued	unless	the	
organization	has	achieved	ISO	27001	certification
§The	scope	of	ISO	27001	certification must	not	be	less	than	the	
scope	of	STAR	certification
§The	assessment	cycle	is	the	same	as	ISO	27001	– initial	assessment	
followed	by	surveillance	audits	over	a	3-year	period
©	ACinfotec	2017	|	www.acinfotec.com Page	37
Certifications of Leading Cloud Service Providers
©	ACinfotec	2017	|	www.acinfotec.com Page	38
Certifications of Leading Cloud Service Providers
©	ACinfotec	2017	|	www.acinfotec.com Page	39
Certifications of Leading Cloud Service Providers
©	ACinfotec	2017	|	www.acinfotec.com Page	40
Can	you	Perform	Pentest for	the	Cloud?
©	ACinfotec	2017	|	www.acinfotec.com Page	41
How	Certified	Cloud	Services	will	Help	You?
Key	Takeaway	– Securing	the	Cloud
Operations
§ Encrypt	data	when	possible,	segregate	
key	management	from	cloud	provider
§ Adapt	secure	software	development	
lifecycle
§ Understand	provider’s	patching,	
provisioning,	protection
§ Logging,	data	exfiltration,	granular	
customer	segregation
§ Hardened	VM	images
§ Assess	provider	IDM	integration,	e.g.	
SAML,	OpenID
Governance
§ Secure	cloud	engagement	before	
procurement	– contracts,	SLAs,	
architecture
§ Know	provider’s	BCM/DR,	financial	
viability,	employee	screening
§ Identify	data	location	when	possible
§ Plan	for	provider	termination	&	return	
of	assets
§ Preserve	right	to	audit
§ Reinvest	provider	cost	savings	into	due	
diligence
For more information, contact: ACinfotec Consulting Services
02-670-8980-3 | services@acinfotec.com | www.acinfotec.com
THANK YOU
DRIVING BUSINESS EXCELLENCE

More Related Content

PDF
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
PPTX
Strengthen Cloud Security
PPTX
Security and governance in the cloud
PDF
Symantec Webinar Cloud Security Threat Report
PPTX
Webinar compiled powerpoint
PDF
Cloud security: Accelerating cloud adoption
PDF
Cloud Security Demystified
PDF
Keys to success and security in the cloud
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
Strengthen Cloud Security
Security and governance in the cloud
Symantec Webinar Cloud Security Threat Report
Webinar compiled powerpoint
Cloud security: Accelerating cloud adoption
Cloud Security Demystified
Keys to success and security in the cloud

What's hot (20)

PPTX
Cloud Security
PDF
Best Practices for Multi-Cloud Security and Compliance
PPTX
CASB: Securing your cloud applications
PDF
CASB — Your new best friend for safe cloud adoption?
PPTX
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
PDF
Scalar cloud study2016_slideshare
PPTX
C-Level tools for Cloud security
PDF
Optimize IT Infrastructure
PPTX
Introduction to Security in the Cloud - Mark Brooks, Alert Logic
PDF
Workshop on CASB Part 2
PPTX
Secure your cloud applications by building solid foundations with enterprise ...
PDF
Inteligentní ochrana osobních údajů v procesu digitální transformace
PDF
Top 5 Cloud Security Predictions for 2016
PPTX
Cloudy with a Chance of...Visibility, Accountability & Security
PDF
Symantec Webinar | Tips for Successful CASB Projects
PDF
Cloud Security - Kloudlearn
DOCX
Owasp top 10_proactive_controls_v3
PDF
Maintaining Visibility and Control as Workers and Apps Scatter
PPTX
Network Transformation: What it is, and how it’s helping companies stay secur...
PPTX
Cloud security training, certified cloud security professional
Cloud Security
Best Practices for Multi-Cloud Security and Compliance
CASB: Securing your cloud applications
CASB — Your new best friend for safe cloud adoption?
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
Scalar cloud study2016_slideshare
C-Level tools for Cloud security
Optimize IT Infrastructure
Introduction to Security in the Cloud - Mark Brooks, Alert Logic
Workshop on CASB Part 2
Secure your cloud applications by building solid foundations with enterprise ...
Inteligentní ochrana osobních údajů v procesu digitální transformace
Top 5 Cloud Security Predictions for 2016
Cloudy with a Chance of...Visibility, Accountability & Security
Symantec Webinar | Tips for Successful CASB Projects
Cloud Security - Kloudlearn
Owasp top 10_proactive_controls_v3
Maintaining Visibility and Control as Workers and Apps Scatter
Network Transformation: What it is, and how it’s helping companies stay secur...
Cloud security training, certified cloud security professional
Ad

Viewers also liked (6)

PPT
Multi – tenancy Challenges in Storage Cloud Byte
PPTX
Architecting Multi-Cloud Applications - Myth or Reality?
PDF
E newsletter promise_&_challenges_of_cloud storage-2
PDF
A Federated Multi-Cloud PaaS Infrasctructure
PDF
Not actually a DevOps Talk
PDF
How to Scale Operations for a Multi-Cloud Platform using PCF
Multi – tenancy Challenges in Storage Cloud Byte
Architecting Multi-Cloud Applications - Myth or Reality?
E newsletter promise_&_challenges_of_cloud storage-2
A Federated Multi-Cloud PaaS Infrasctructure
Not actually a DevOps Talk
How to Scale Operations for a Multi-Cloud Platform using PCF
Ad

Similar to Cloud Security & Privacy Standard Slide (20)

PDF
Cisco Connect 2018 Philippines - security keynote
PDF
Cisco Connect 2018 Singapore - Changing the Security Equation
PDF
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
PDF
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
PDF
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
PDF
Trend Micro Solutions Overview
PPTX
Pat Gelsinger - Welcome
PPTX
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
PDF
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
PPT
Growing need for cyber security
PPTX
2017 Security Report Presentation
PPTX
Online security (Daniel Beazer)
PDF
Aon Cyber Newsletter v10
PDF
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
PDF
Making Security Work—Implementing a Transformational Security Program
PDF
PPTX
A world of connected object Designed to Serve Us
PPTX
Mobile Security: 2016 Wrap-Up and 2017 Predictions
PPTX
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
PPTX
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
Trend Micro Solutions Overview
Pat Gelsinger - Welcome
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
Growing need for cyber security
2017 Security Report Presentation
Online security (Daniel Beazer)
Aon Cyber Newsletter v10
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
Making Security Work—Implementing a Transformational Security Program
A world of connected object Designed to Serve Us
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...

Recently uploaded (20)

PDF
Advanced IT Governance
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
cuic standard and advanced reporting.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Cloud computing and distributed systems.
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Big Data Technologies - Introduction.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Advanced IT Governance
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
cuic standard and advanced reporting.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Cloud computing and distributed systems.
The AUB Centre for AI in Media Proposal.docx
Big Data Technologies - Introduction.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Network Security Unit 5.pdf for BCA BBA.
GamePlan Trading System Review: Professional Trader's Honest Take
Understanding_Digital_Forensics_Presentation.pptx
Approach and Philosophy of On baking technology
Spectral efficient network and resource selection model in 5G networks
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Dropbox Q2 2025 Financial Results & Investor Presentation
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication

Cloud Security & Privacy Standard Slide