SlideShare a Scribd company logo
Hector Del Castillo
AIPMM
linkd.in/hdelcastillo
What We Will Discuss
1.   What is cloud security
2.   Current situation
3.   Dimensions of cloud security
4.   Security risks
5.   Critical areas
6.   Approaches to reduce risk
7.   Key takeaways
What is Cloud Security?
• An evolving sub-domain of computer security
• A broad set of policies, technologies, and
  controls deployed to protect data,
  applications, and the associated infrastructure
  of cloud computing
• Should not be confused with ‘cloud-based’
  security software offerings
• Many commercial software vendors have
  cloud-based offerings such as anti-virus or
  vulnerability management
Current Situation
• Analysts estimate that cloud computing
  adoption will continue to rapidly increase
• A single, massive cloud data center contains
  more computers than were on the entire
  internet just a few years ago
• Security experts agree that the number of
  attacks and their level of sophistication will
  continue to grow
Source: NIST Special Publication 800-144, Jan 2011
Service Models
                                Software           Platform             Infrastructure
Deployment Models




                                as a Service       as a Service         as a Service
                                (SaaS)             (PaaS)               (IaaS)
                    Private                                 X                     X
                    Hybrid            X                     X                     X
                    Public            X                     X                     X
                    Community         X                     X                     X

                                           Source: NIST Special Publication 800-144, Jan 2011
Cloud Solutions
“Cloud Services
market to grow to
$42B by 2012.”
- IDC




                    Source: ZDNet Blogs
Cloud Security Reference Model




                   Source: Cloud Security Alliance
Dimensions of Cloud Security
• Security and Privacy
  – Data protection
  – Identity management
  – Physical and personnel security
  – Availability
  – Application security
  – Privacy

            Source: "Cloud Security Front and Center,” Forrester Research, 2009.
Dimensions of Cloud Security
• Compliance
  – Business continuity and data recovery
  – Logs and audit trails
  – Unique compliance requirements




            Source: "Cloud Security Front and Center,” Forrester Research, 2009.
Dimensions of Cloud Security
• Legal or Contractual Issues
  – Public records




            Source: "Cloud Security Front and Center,” Forrester Research, 2009.
Security Risks
1.   Privileged user access
2.   Regulatory compliance
3.   Data location
4.   Data segregation
5.   Recovery
6.   Investigative support
7.   Long-term viability
          Source: “Assessing the Security Risks of Cloud Computing,” Gartner, 2008.
Critical Areas
• Cloud Architecture
     – Cloud Computing Architectural Framework




Source: "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” CSA, 2009.
Critical Areas
• Governing in the Cloud
     –   Governance and Enterprise Risk Management
     –   Legal and Electronic Discovery
     –   Compliance and Audit
     –   Information Lifecycle Management
     –   Portability and Interoperability



Source: "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” CSA, 2009.
Critical Areas
• Operating in the Cloud
     – Traditional Security, Business Continuity, and Disaster
       Recovery
     – Data Center Operations
     – Incident Response, Notification, and Remediation
     – Application Security
     – Encryption and Key Management
     – Identity and Access Management
     – Virtualization
Source: "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” CSA, 2009.
Recommendations
   Trust (4)
   Transnational Data Flows (4)
   Transparency (2)
   Transformation (4)



                    Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Trust
1. (Security & Assurance Frameworks): Industry
   and government should support and participate
   in the development and implementation of
   international, standardized frameworks for
   securing, assessing, certifying and accrediting
   cloud solutions.


                   Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Trust
2. (Identity Management): Should accelerate the
   development of a private sector-led identity
   management ecosystem as envisioned by the
   National Strategy for Trusted Identities in
   Cyberspace (NSTIC) to facilitate the adoption of
   strong authentication technologies and enable
   users to gain secure access to cloud services and
   websites.
                    Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Trust
3. (Responses to Data Breaches): Government
   should enact a national data breach law to
   clarify breach notification responsibilities and
   commitments of companies to their customers,
   and also update and strengthen criminal laws
   against those who attack computer systems and
   networks, including cloud computing services.
                    Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Trust
4. (Research): Government, industry, and
   academia should develop and execute a joint
   cloud computing research agenda.




                  Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transnational Data Flows
5. (Privacy): The U.S. government and industry
   should promote a comprehensive,
   technology-neutral privacy framework,
   consistent with commonly accepted privacy
   and data protection principles-based
   frameworks such as the OECD principles
   and/or APEC privacy frameworks.
                  Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transnational Data Flows
6. (Government/Law Enforcement Access to
   Data): The U.S. government should
   demonstrate leadership in identifying and
   implementing mechanisms for lawful access
   by law enforcement or government to data
   stored in the cloud.

                 Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transnational Data Flows
7. (E-Discovery and Forensics): Government
   and industry should enable effective
   practices for collecting information from the
   cloud to meet forensic or e-discovery needs
   in ways that fully support legal due process
   while minimizing impact on cloud provider
   operations.
                   Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transnational Data Flows
8. (Lead by Example): The U.S. government
   should demonstrate its willingness to trust
   cloud computing environments in other
   countries for appropriate government
   workloads.


                  Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transparency
9. (Transparency): Industry should publicly
   disclose information about relevant
   operational aspects of their cloud services,
   including portability, interoperability,
   security, certifications, performance and
   reliability.

                   Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transparency
10. (Data Portability): Cloud providers should
    enable portability of user data through
    documents, tools, and support for agreed-
    upon industry standards and best practices.



                  Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transformation
11. (Federal Acquisition and Budgeting):
    Agencies should demonstrate flexibility in
    adapting existing procurement models to
    facilitate acquisition of cloud services and
    solutions. Congress and OMB should
    demonstrate flexibility in changing budget
    models to help agencies acquire cloud
    services and solutions.
                   Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transformation
12. (Incentives): Government should establish
    policies and processes for providing fiscal
    incentives, rewards and support for agencies
    as they take steps towards implementing
    cloud deployments.


                  Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transformation
13. (Improve Infrastructure): Government and
    industry should embrace the modernization
    of broadband infrastructure and the current
    move to IPv6 to improve the bandwidth and
    reliable connectivity necessary for the
    growth of cloud services.

                  Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Approaches to Reduce Risk
Transformation
14. (Education/Training): Government, industry,
    and academia should develop and
    disseminate resources for major stakeholder
    communities to be educated on the
    technical, business, and policy issues around
    acquisition, deployment and operation of
    cloud services.
                   Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
Key Takeaways
1   • Cloud security continues to evolve

    • Security issues are global and impact providers
2     and customers
    • Cloud security requires action for government,
3     industry and academia
    • Data owner must implement traditional layered
4     security approach
    • Data owner must segregate data from
5     application
Recommended AFCOM Sessions
1. "DCM18: Securing the Virtualized Environment,”
   Robert Klotz, Akibia, 2011.
2. "DCP10: How Social Media and the Cloud Impact
   Data Center Security,” James Danburg, SA2, 2011.
3. "Cloud07: Managing the Transition Cloud,” Brent
   Eubanks, Latisys, 2011.
4. "Cloud04: The Ins and Outs of Virtual Private
   Clouds,” Sundar Raghavan, Skytap, 2011.
Recommended Reading
1. “Assessing the Security Risks of Cloud Computing,”
   Gartner, 3 June 2008.
2. "Cloud Security Front and Center,” Forrester Research,
   18 Nov 2009.
3. "Security Guidance for Critical Areas of Focus in Cloud
   Computing V2.1,” Cloud Security Alliance, 2009.
4. “Guidelines on Security and Privacy in Public Cloud
   Computing, NIST Special Publication 800-144, Jan 2011.
5. “Summary Report of the Commission on the Leadership
   Opportunity in U.S. Deployment of the Cloud,”
   TechAmerica Foundation, July 2011.
Join My Professional Network!




Hector Del Castillo, PMP, CPM, CPMM
         linkd.in/hdelcastillo
      hmdelcastillo@aipmm.com

More Related Content

PDF
Cloud Security Strategy
PPTX
Cloud computing and its security issues
PDF
Cloud computing understanding security risk and management
PDF
SECURE CLOUD ARCHITECTURE
PPTX
Cloud computing security issues and challenges
PDF
Cloud Computing Risk Management (Multi Venue)
PPT
Cloud Computing Security Issues
DOCX
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Security Strategy
Cloud computing and its security issues
Cloud computing understanding security risk and management
SECURE CLOUD ARCHITECTURE
Cloud computing security issues and challenges
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Security Issues
Cloud Computing Security Issues in Infrastructure as a Service” report

What's hot (20)

PPT
Security in Cloud Computing
PDF
A Survey on Cloud Computing Security – Challenges and Trust Issues
PPTX
Cloud computing security & forensics (manu)
PDF
Cloud Computing Security
PDF
A proposal for implementing cloud computing in newspaper company
PPT
Cloud Computing: Architecture, IT Security and Operational Perspectives
PPT
Cloud Computing - Security Benefits and Risks
PDF
CLOUD COMPUTING_proposal
PDF
Cloud computing security issues and challenges
PPT
Cloud Computing Security Issues in Infrastructure as a Service”
PPTX
Cloud Computing Security Issues
PPT
Security issue in cloud by himanshu tiwari
PDF
Cloud Computing- Proposal (Autosaved)
PDF
Cloud Security
PPT
Cloud Computing & Security Concerns
PPT
security Issues of cloud computing
PDF
Cloud Security - Security Aspects of Cloud Computing
PDF
Evaluation Of The Data Security Methods In Cloud Computing Environments
PPTX
Cloud Computing Security
PDF
Data Security Model Enhancement In Cloud Environment
Security in Cloud Computing
A Survey on Cloud Computing Security – Challenges and Trust Issues
Cloud computing security & forensics (manu)
Cloud Computing Security
A proposal for implementing cloud computing in newspaper company
Cloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing - Security Benefits and Risks
CLOUD COMPUTING_proposal
Cloud computing security issues and challenges
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues
Security issue in cloud by himanshu tiwari
Cloud Computing- Proposal (Autosaved)
Cloud Security
Cloud Computing & Security Concerns
security Issues of cloud computing
Cloud Security - Security Aspects of Cloud Computing
Evaluation Of The Data Security Methods In Cloud Computing Environments
Cloud Computing Security
Data Security Model Enhancement In Cloud Environment
Ad

Similar to Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM (20)

PDF
Design and implement a new cloud security method based on multi clouds on ope...
PDF
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
PDF
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
PDF
Industrial IOT Data Connectivity Standard
PDF
Cloud computing
PDF
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
PDF
A study on_security_and_privacy_issues_o
PDF
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
PDF
Security Issues in Cloud Computing Cloud computing has come a vital tool for ...
PDF
A Review On Data Security In Cloud Computing
PPTX
Introduction to Cloud Computing and Cloud Infrastructure
PDF
Introduction to cloud security
PDF
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
PDF
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
PDF
1376843836 94879193
PDF
1376843836 94879193
DOCX
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
PDF
Cloud Computing Service Availability.pdf
PPT
Taking Healthcare to the Cloud
DOCX
Review of Business Information Systems – Fourth Quarter 2013 V.docx
Design and implement a new cloud security method based on multi clouds on ope...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
Industrial IOT Data Connectivity Standard
Cloud computing
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
A study on_security_and_privacy_issues_o
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Security Issues in Cloud Computing Cloud computing has come a vital tool for ...
A Review On Data Security In Cloud Computing
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to cloud security
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
1376843836 94879193
1376843836 94879193
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
Cloud Computing Service Availability.pdf
Taking Healthcare to the Cloud
Review of Business Information Systems – Fourth Quarter 2013 V.docx
Ad

More from Hector Del Castillo, CPM, CPMM (20)

PDF
Fueling Growth - Funding & Scaling Your Business - AI Amplified SB Summit 202...
PPTX
Axcess Instruments Pitch Deck - Newport Beach Investor Conference 2025
PDF
Investment-Ready - A Blueprint for Medtech & Healthtech Founders | InnovatorM...
PDF
Laparoscopic UHD Imaging System Pitch Deck | March 2025
PDF
How To Get Your PMP Certification in 2024 | PMISSC Info Session | July 19, 2024
PDF
The Power of PM Job Search Councils | PMISSC Info Session | July 12, 2024.pdf
PDF
Connected Small Boat Protection Solution | July 2024
PDF
Community Skills Building Workshop | PMI Silver Spring Chapter | June 12, 2024
PDF
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter | May 31, 2024
PDF
WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024
PDF
Home Furnishings Ecommerce Platform | June 2024
PDF
Advanced Analytics for Aircraft Ground Operations Efficiency | Byond Investor...
PDF
HomeRoots Pitch Deck | Investor Insights | April 2024
PDF
PM Job Search Council Info Session - PMI Silver Spring Chapter
PDF
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
PDF
How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024
PDF
The Future of Business: How AI is Transforming Mid-Market Operations, Product...
PDF
Byond Business Growth Live CEO M&A Panel Discussion
PDF
End of Times Views - Book of Revelation Summary
PDF
How AI is Transforming Project Management - PMI Silver Spring Chapter - Octob...
Fueling Growth - Funding & Scaling Your Business - AI Amplified SB Summit 202...
Axcess Instruments Pitch Deck - Newport Beach Investor Conference 2025
Investment-Ready - A Blueprint for Medtech & Healthtech Founders | InnovatorM...
Laparoscopic UHD Imaging System Pitch Deck | March 2025
How To Get Your PMP Certification in 2024 | PMISSC Info Session | July 19, 2024
The Power of PM Job Search Councils | PMISSC Info Session | July 12, 2024.pdf
Connected Small Boat Protection Solution | July 2024
Community Skills Building Workshop | PMI Silver Spring Chapter | June 12, 2024
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter | May 31, 2024
WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024
Home Furnishings Ecommerce Platform | June 2024
Advanced Analytics for Aircraft Ground Operations Efficiency | Byond Investor...
HomeRoots Pitch Deck | Investor Insights | April 2024
PM Job Search Council Info Session - PMI Silver Spring Chapter
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How To Land Your Next PM Dream Job - PMISSC Meeting - April 2024
The Future of Business: How AI is Transforming Mid-Market Operations, Product...
Byond Business Growth Live CEO M&A Panel Discussion
End of Times Views - Book of Revelation Summary
How AI is Transforming Project Management - PMI Silver Spring Chapter - Octob...

Recently uploaded (20)

PDF
Basic Mud Logging Guide for educational purpose
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Open folder Downloads.pdf yes yes ges yes
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
01-Introduction-to-Information-Management.pdf
PDF
The Final Stretch: How to Release a Game and Not Die in the Process.
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Business Ethics Teaching Materials for college
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Open Quiz Monsoon Mind Game Prelims.pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Insiders guide to clinical Medicine.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Introduction-to-Social-Work-by-Leonora-Serafeca-De-Guzman-Group-2.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Microbial diseases, their pathogenesis and prophylaxis
Basic Mud Logging Guide for educational purpose
PPH.pptx obstetrics and gynecology in nursing
Open folder Downloads.pdf yes yes ges yes
Microbial disease of the cardiovascular and lymphatic systems
01-Introduction-to-Information-Management.pdf
The Final Stretch: How to Release a Game and Not Die in the Process.
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Business Ethics Teaching Materials for college
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Open Quiz Monsoon Mind Game Prelims.pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Insiders guide to clinical Medicine.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Introduction-to-Social-Work-by-Leonora-Serafeca-De-Guzman-Group-2.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Microbial diseases, their pathogenesis and prophylaxis

Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM

  • 2. What We Will Discuss 1. What is cloud security 2. Current situation 3. Dimensions of cloud security 4. Security risks 5. Critical areas 6. Approaches to reduce risk 7. Key takeaways
  • 3. What is Cloud Security? • An evolving sub-domain of computer security • A broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing • Should not be confused with ‘cloud-based’ security software offerings • Many commercial software vendors have cloud-based offerings such as anti-virus or vulnerability management
  • 4. Current Situation • Analysts estimate that cloud computing adoption will continue to rapidly increase • A single, massive cloud data center contains more computers than were on the entire internet just a few years ago • Security experts agree that the number of attacks and their level of sophistication will continue to grow
  • 5. Source: NIST Special Publication 800-144, Jan 2011
  • 6. Service Models Software Platform Infrastructure Deployment Models as a Service as a Service as a Service (SaaS) (PaaS) (IaaS) Private X X Hybrid X X X Public X X X Community X X X Source: NIST Special Publication 800-144, Jan 2011
  • 8. “Cloud Services market to grow to $42B by 2012.” - IDC Source: ZDNet Blogs
  • 9. Cloud Security Reference Model Source: Cloud Security Alliance
  • 10. Dimensions of Cloud Security • Security and Privacy – Data protection – Identity management – Physical and personnel security – Availability – Application security – Privacy Source: "Cloud Security Front and Center,” Forrester Research, 2009.
  • 11. Dimensions of Cloud Security • Compliance – Business continuity and data recovery – Logs and audit trails – Unique compliance requirements Source: "Cloud Security Front and Center,” Forrester Research, 2009.
  • 12. Dimensions of Cloud Security • Legal or Contractual Issues – Public records Source: "Cloud Security Front and Center,” Forrester Research, 2009.
  • 13. Security Risks 1. Privileged user access 2. Regulatory compliance 3. Data location 4. Data segregation 5. Recovery 6. Investigative support 7. Long-term viability Source: “Assessing the Security Risks of Cloud Computing,” Gartner, 2008.
  • 14. Critical Areas • Cloud Architecture – Cloud Computing Architectural Framework Source: "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” CSA, 2009.
  • 15. Critical Areas • Governing in the Cloud – Governance and Enterprise Risk Management – Legal and Electronic Discovery – Compliance and Audit – Information Lifecycle Management – Portability and Interoperability Source: "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” CSA, 2009.
  • 16. Critical Areas • Operating in the Cloud – Traditional Security, Business Continuity, and Disaster Recovery – Data Center Operations – Incident Response, Notification, and Remediation – Application Security – Encryption and Key Management – Identity and Access Management – Virtualization Source: "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” CSA, 2009.
  • 17. Recommendations  Trust (4)  Transnational Data Flows (4)  Transparency (2)  Transformation (4) Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 18. Approaches to Reduce Risk Trust 1. (Security & Assurance Frameworks): Industry and government should support and participate in the development and implementation of international, standardized frameworks for securing, assessing, certifying and accrediting cloud solutions. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 19. Approaches to Reduce Risk Trust 2. (Identity Management): Should accelerate the development of a private sector-led identity management ecosystem as envisioned by the National Strategy for Trusted Identities in Cyberspace (NSTIC) to facilitate the adoption of strong authentication technologies and enable users to gain secure access to cloud services and websites. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 20. Approaches to Reduce Risk Trust 3. (Responses to Data Breaches): Government should enact a national data breach law to clarify breach notification responsibilities and commitments of companies to their customers, and also update and strengthen criminal laws against those who attack computer systems and networks, including cloud computing services. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 21. Approaches to Reduce Risk Trust 4. (Research): Government, industry, and academia should develop and execute a joint cloud computing research agenda. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 22. Approaches to Reduce Risk Transnational Data Flows 5. (Privacy): The U.S. government and industry should promote a comprehensive, technology-neutral privacy framework, consistent with commonly accepted privacy and data protection principles-based frameworks such as the OECD principles and/or APEC privacy frameworks. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 23. Approaches to Reduce Risk Transnational Data Flows 6. (Government/Law Enforcement Access to Data): The U.S. government should demonstrate leadership in identifying and implementing mechanisms for lawful access by law enforcement or government to data stored in the cloud. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 24. Approaches to Reduce Risk Transnational Data Flows 7. (E-Discovery and Forensics): Government and industry should enable effective practices for collecting information from the cloud to meet forensic or e-discovery needs in ways that fully support legal due process while minimizing impact on cloud provider operations. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 25. Approaches to Reduce Risk Transnational Data Flows 8. (Lead by Example): The U.S. government should demonstrate its willingness to trust cloud computing environments in other countries for appropriate government workloads. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 26. Approaches to Reduce Risk Transparency 9. (Transparency): Industry should publicly disclose information about relevant operational aspects of their cloud services, including portability, interoperability, security, certifications, performance and reliability. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 27. Approaches to Reduce Risk Transparency 10. (Data Portability): Cloud providers should enable portability of user data through documents, tools, and support for agreed- upon industry standards and best practices. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 28. Approaches to Reduce Risk Transformation 11. (Federal Acquisition and Budgeting): Agencies should demonstrate flexibility in adapting existing procurement models to facilitate acquisition of cloud services and solutions. Congress and OMB should demonstrate flexibility in changing budget models to help agencies acquire cloud services and solutions. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 29. Approaches to Reduce Risk Transformation 12. (Incentives): Government should establish policies and processes for providing fiscal incentives, rewards and support for agencies as they take steps towards implementing cloud deployments. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 30. Approaches to Reduce Risk Transformation 13. (Improve Infrastructure): Government and industry should embrace the modernization of broadband infrastructure and the current move to IPv6 to improve the bandwidth and reliable connectivity necessary for the growth of cloud services. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 31. Approaches to Reduce Risk Transformation 14. (Education/Training): Government, industry, and academia should develop and disseminate resources for major stakeholder communities to be educated on the technical, business, and policy issues around acquisition, deployment and operation of cloud services. Source: “CLOUD2 Summary Report,” TechAmerica, 2011.
  • 32. Key Takeaways 1 • Cloud security continues to evolve • Security issues are global and impact providers 2 and customers • Cloud security requires action for government, 3 industry and academia • Data owner must implement traditional layered 4 security approach • Data owner must segregate data from 5 application
  • 33. Recommended AFCOM Sessions 1. "DCM18: Securing the Virtualized Environment,” Robert Klotz, Akibia, 2011. 2. "DCP10: How Social Media and the Cloud Impact Data Center Security,” James Danburg, SA2, 2011. 3. "Cloud07: Managing the Transition Cloud,” Brent Eubanks, Latisys, 2011. 4. "Cloud04: The Ins and Outs of Virtual Private Clouds,” Sundar Raghavan, Skytap, 2011.
  • 34. Recommended Reading 1. “Assessing the Security Risks of Cloud Computing,” Gartner, 3 June 2008. 2. "Cloud Security Front and Center,” Forrester Research, 18 Nov 2009. 3. "Security Guidance for Critical Areas of Focus in Cloud Computing V2.1,” Cloud Security Alliance, 2009. 4. “Guidelines on Security and Privacy in Public Cloud Computing, NIST Special Publication 800-144, Jan 2011. 5. “Summary Report of the Commission on the Leadership Opportunity in U.S. Deployment of the Cloud,” TechAmerica Foundation, July 2011.
  • 35. Join My Professional Network! Hector Del Castillo, PMP, CPM, CPMM linkd.in/hdelcastillo hmdelcastillo@aipmm.com