SlideShare a Scribd company logo
www.cloudsecurityalliance.org
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
Cloud
One million new
mobile devices -
each day!
Social Networking
Digital Natives
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.org
Copyright © 2013 Cloud Security Alliance
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.org
State Sponsored Cyberattacks?
Organized Crime?
Legal Jurisdiction & Data Sovereignty?
Global Security Standards?
Privacy Protection for Citizens?
Transparency & Visibility from Cloud Providers?
Copyright © 2013 Cloud Security Alliance
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.org
Shift the balance of power to consumers of IT
Enable innovation to solve difficult problems of
humanity
Give the individual the tools to control their digital
destiny
Do this by creating confidence, trust and
transparency in IT systems
Security is not overhead, it is the enabler
Copyright © 2013 Cloud Security Alliance
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
www.cloudsecurityalliance.org
7
enterprise
boundary
public clouds
private clouds
cloud of users
Notional
organizational
boundary
• Cloud + Mobile
• Dispersal of applications
• Dispersal of data
• Dispersal of users
• Dispersal of endpoint
devices
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
https://cloudsecurityalliance.org/research/top-threats/
www.cloudsecurityalliance.org
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
Sunlight is the best
disinfectant,”
U.S. Supreme Court Justice Louis
Brandeis
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
Control
Requirements
Provider
Assertions
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
GRC Stack
Family of 4 research projects
Cloud Controls Matrix (CCM)
Consensus Assessments Initiative
(CAI)
Cloud Audit
Cloud Trust Protocol (CTP)
Impact to the Industry
Developed tools for governance,
risk and compliance management
in the cloud
Technical pilots
Provider certification through
STAR program
Control
Requirements
Provider
Assertions
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
2 Registered
(December 2012)
30 Registered
(April 2013)
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
DG 4.2: Do you have a documented procedure for responding to requests
for tenant data from governments or third parties?
Amazon AWS
AWS errs on the side of protecting customer privacy and is vigilant in
determining which law enforcement requests we must comply with. AWS
does not hesitate to challenge orders from law enforcement if we think the
orders lack a solid basis.
Box.net
Box does have documented procedures for responding to requests for tenant
data from governments and third parties.
SHI
Customer responsibility. SHI has no direct access, so requests for data
through third parties will be responded to by the customer themselves,
however, SHI can sanitize and delete customer data upon migration from the
cloud.
Verizon/Terremark Yes
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
OPEN CERTIFICATION FRAMEWORK
CONTINUOUS
ATTESTATION | CERTIFICATION
SELF ASSESSMENT
TRANSPERANCY
ASSURANCE
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
Clear GRC objectives
3rd Party
Assessment
Real time,
continuous
monitoring
+
+
Self Assessment
+
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
www.cloudsecurityalliance.orgCopyright © 2012 Cloud Security Alliance
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
www.cloudsecurityalliance.orgCopyright © 2012 Cloud Security Alliance
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.org
Our research includes
fundamental projects needed
to define and implement trust
within the future of
information technology
CSA continues to be
aggressive in producing
critical research, education
and tools
Copyright © 2013 Cloud Security Alliance
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
Previously known as Trusted Cloud
Initiative
Security reference architecture for cloud
Architecture in use by early adopters of cloud in
Global 2000
Cloud brokering
To do:
Management tools
Technical implementation guides
Documented case studies & use cases
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
Certificate of Cloud Security
Knowledge (CCSK)
Benchmark of cloud security
competency
Online web-based examination
www.cloudsecurityalliance.org/certifyme
Training partnerships
Developing new curriculum for
audit, software development and
architecture
Partnership with (ISC)2 for cloud
security architecture certification
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance
www.cloudsecurityalliance.orgwww.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.org
Please contact Jim Reavis at
jreavis@cloudsecurityalliance.
org for more information on the
Cloud Security Alliance
I will see you at the CSA
EMEA Congress, September
24-26 in Edinburgh
Copyright © 2013 Cloud Security Alliance
https://cloudsecurityalliance.org/events/csa-emea-congress-2013/
www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2013 Cloud Security Alliance

More Related Content

PDF
CSA Argentina - Jornada CXO Cloud
PDF
Winning Strategy For Hybrid Cloud Environments
PDF
Global Mandate to Secure Cloud Computing
PPTX
Lss implementing cyber security in the cloud, and from the cloud-feb14
PPTX
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
PDF
EveryCloud_Company_Intro_Piece
PDF
Brink sanders cisco architecture keynote
PPTX
Cloud Security
CSA Argentina - Jornada CXO Cloud
Winning Strategy For Hybrid Cloud Environments
Global Mandate to Secure Cloud Computing
Lss implementing cyber security in the cloud, and from the cloud-feb14
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
EveryCloud_Company_Intro_Piece
Brink sanders cisco architecture keynote
Cloud Security

What's hot (20)

PDF
Introduction to Cloud Security
PPTX
Seclore for McAfee MVISION Cloud
PDF
Laser Pioneer Secures Network End-to-End to Protect Assets
PDF
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
PPTX
Cloud Managed Services: Cloud Infrastructure
PPTX
2012 10 cloud security architecture
PPTX
Rethinking Cybersecurity for the Digital Transformation Era
PDF
The New Economics of Cloud Security
PDF
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
PDF
CSA Security Guidance Cloud Computing v3.0
PPTX
C-Level tools for Cloud security
PDF
Forcepoint Dynamic Data Protection
PDF
Security Everywhere: A Growth Engine for the Digital Economy
PDF
Security, Compliance and Cloud - Jelecos
PDF
PPTX
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
PPTX
ATA meetup - Feb 2020 - DevSecOps
PDF
Qualys Suite
PPTX
CipherCloud's Solutions for Salesforce Chatter
PPTX
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Introduction to Cloud Security
Seclore for McAfee MVISION Cloud
Laser Pioneer Secures Network End-to-End to Protect Assets
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Cloud Managed Services: Cloud Infrastructure
2012 10 cloud security architecture
Rethinking Cybersecurity for the Digital Transformation Era
The New Economics of Cloud Security
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
CSA Security Guidance Cloud Computing v3.0
C-Level tools for Cloud security
Forcepoint Dynamic Data Protection
Security Everywhere: A Growth Engine for the Digital Economy
Security, Compliance and Cloud - Jelecos
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
ATA meetup - Feb 2020 - DevSecOps
Qualys Suite
CipherCloud's Solutions for Salesforce Chatter
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Ad

Viewers also liked (8)

PDF
JP UAE DL
PDF
The Evolution of Design Thinking Edoardo Stecca 848179
DOCX
Updated Afaq CV
PDF
Thoughts from WiML 2015 and NIPS 2015
PPT
Modulo 2 jigsaw classroom 8.9.2014
PPTX
Using Business Intelligence to Bring Your Data to Life
PDF
Paper 4 (ali mansouri)
JP UAE DL
The Evolution of Design Thinking Edoardo Stecca 848179
Updated Afaq CV
Thoughts from WiML 2015 and NIPS 2015
Modulo 2 jigsaw classroom 8.9.2014
Using Business Intelligence to Bring Your Data to Life
Paper 4 (ali mansouri)
Ad

Similar to Global Efforts to Secure Cloud Computing (20)

PDF
PPTX
20,000 Hours in the Cloud - Top 5 Cloud Lessons Learned By Tom Lounibos, CEO ...
PPTX
20,000 Hours in the Cloud - Top 5 Cloud Lessons Learned By Tom Lounibos, CEO ...
PDF
Zero trust strategy: cloud security by design
PDF
CCSK, cloud security framework, Indonesia
PDF
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
PDF
Cloud Architect Company in India
PDF
Is the Cloud ready for Your Firm?
PPTX
Webinar: CYREN WebSecurity for Enterprise
PPTX
2014 2nd me cloud conference trust in the cloud v01
PDF
EveryCloud_Company_Intro_Piece
PDF
Keys to success and security in the cloud
PDF
Keys-to-Success-and-Security-in-the-Cloud
PDF
Secure Your Sky_ Mastering Cloud Web Security.pdf
PPT
3245224.ppt
PDF
Advantages of Cloud Computing for Business
PPTX
Top 5 predictions webinar
PDF
Building a Resilient Cloud Security Architecture: Types, Challenges, and Best...
PDF
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
PDF
20,000 Hours in the Cloud - Top 5 Cloud Lessons Learned By Tom Lounibos, CEO ...
20,000 Hours in the Cloud - Top 5 Cloud Lessons Learned By Tom Lounibos, CEO ...
Zero trust strategy: cloud security by design
CCSK, cloud security framework, Indonesia
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Architect Company in India
Is the Cloud ready for Your Firm?
Webinar: CYREN WebSecurity for Enterprise
2014 2nd me cloud conference trust in the cloud v01
EveryCloud_Company_Intro_Piece
Keys to success and security in the cloud
Keys-to-Success-and-Security-in-the-Cloud
Secure Your Sky_ Mastering Cloud Web Security.pdf
3245224.ppt
Advantages of Cloud Computing for Business
Top 5 predictions webinar
Building a Resilient Cloud Security Architecture: Types, Challenges, and Best...
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf

More from InnoTech (20)

PDF
"So you want to raise funding and build a team?"
PDF
Artificial Intelligence is Maturing
PDF
What is AI without Data?
PDF
Courageous Leadership - When it Matters Most
PPTX
The Gathering Storm
PPTX
Sql Server tips from the field
PPTX
Quantum Computing and its security implications
PPSX
Converged Infrastructure
PPTX
Making the most out of collaboration with Office 365
PPTX
Blockchain use cases and case studies
PPTX
Blockchain: Exploring the Fundamentals and Promising Potential
PDF
Business leaders are engaging labor differently - Is your IT ready?
PDF
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
PDF
User requirements is a fallacy
PDF
What I Wish I Knew Before I Signed that Contract - San Antonio
PPTX
Disaster Recovery Plan - Quorum
PPTX
Share point saturday access services 2015 final 2
PDF
Sp tech festdallas - office 365 groups - planner session
PPTX
Power apps presentation
PPTX
Using rest to create responsive html 5 share point intranets
"So you want to raise funding and build a team?"
Artificial Intelligence is Maturing
What is AI without Data?
Courageous Leadership - When it Matters Most
The Gathering Storm
Sql Server tips from the field
Quantum Computing and its security implications
Converged Infrastructure
Making the most out of collaboration with Office 365
Blockchain use cases and case studies
Blockchain: Exploring the Fundamentals and Promising Potential
Business leaders are engaging labor differently - Is your IT ready?
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
User requirements is a fallacy
What I Wish I Knew Before I Signed that Contract - San Antonio
Disaster Recovery Plan - Quorum
Share point saturday access services 2015 final 2
Sp tech festdallas - office 365 groups - planner session
Power apps presentation
Using rest to create responsive html 5 share point intranets

Recently uploaded (20)

PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Cloud computing and distributed systems.
PPTX
Big Data Technologies - Introduction.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Electronic commerce courselecture one. Pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
KodekX | Application Modernization Development
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Approach and Philosophy of On baking technology
CIFDAQ's Market Insight: SEC Turns Pro Crypto
NewMind AI Weekly Chronicles - August'25 Week I
Unlocking AI with Model Context Protocol (MCP)
Diabetes mellitus diagnosis method based random forest with bat algorithm
Cloud computing and distributed systems.
Big Data Technologies - Introduction.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Electronic commerce courselecture one. Pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Reach Out and Touch Someone: Haptics and Empathic Computing
KodekX | Application Modernization Development
The AUB Centre for AI in Media Proposal.docx
20250228 LYD VKU AI Blended-Learning.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Empathic Computing: Creating Shared Understanding
Approach and Philosophy of On baking technology

Global Efforts to Secure Cloud Computing

Editor's Notes

  • #10: Will my provider be transparent about how they manage their systems, organization governance, etc?Will I be considered compliant?Do I know where my data is?Will a lack of standards drive unexpected obsolescence? Is my provider really better at security than me?Are the hackers waiting for me in the cloud?Will I get fired?How can we gracefully “lose control” of IT
  • #17: The CSA Security, Trust & Assurance Registry (STAR) is a free, publicly accessible registry that documents the security controls provided by various cloud computing offerings, thereby helping users assess the security of cloud providers they currently use or are considering contracting with.CSA STAR is open to all cloud providers, and allows them to submit self assessment reports that document compliance to CSA published best practices. The searchable registry will allow potential cloud customers to review the security practices of providers, accelerating their due diligence and leading to higher quality procurement experiences. CSA STAR represents a major leap forward in industry transparency, encouraging providers to make security capabilities a market differentiator.
  • #19: Sample entry from Verizon Terremark
  • #20: We can start having fun scrutinizing entries!