SlideShare a Scribd company logo
1
Analysing the Current Data Protection Legal Framework: challenges
and ways forward
Privacy policies for the cloud
Prof David Wallom
Overview
• Worried? should you be?
• Its all about trust
• Bolster trust or make it so we don’t need it…
Why all this worry?
Why all this worry?
– Cloud computing is pervasive in modern society
Cats, Kids and fun…
Its not just all about cats and kids…
Privacy and Security policies in the cloud
Why all this worry?
– Cloud computing is pervasive in modern society
– Limited market penetration from EU cloud provider -> vast majority of cloud providers based outside EU
Who are the cloud providers?
Why all this worry?
– Cloud computing is pervasive in modern society
– Limited market penetration from EU cloud provider -> vast majority of cloud providers based outside EU
– Pace of service development and nefarious capability outstrips that of the regulatory environment
What should you think about when…
Who are you entering into a contract with?
What protections does your contract give you?
Who can make changes to the T&C?
Where is the data?
On whom is the liability?
7 Cloud Computing security risks
Trust at the Last Mile
• Problem for high value instantly usable data and services
– Critical data or keys are still exposed inside the cloud at the final steps
– Still require customers unconditional trust of their CSP
“What is really going on
inside the cloud?”
Building trust through brands
New Industries Around Security and Trust
Building trust through regulation
Approach: Government
procurement framework
Highlights:
• Based on ISO 27001
• Most data is “official”
• Reusable certification
European Union:
ENISA CCSL and CCSM
Approach: Procurement
guidance
Highlights:
• Maps certification
regimes relevant to
cloud customers
Notable strength:
• Flexible
Notable strength:
• Standards-based
Notable strength:
• Transparent
Notable strength:
• Risk-based
Public sector approaches to cloud security
Approach: Government
procurement framework
Highlights:
• Based on NIST 800-
53v4
• Moderate and High
baseline controls
Approach: Government
procurement guidance
Highlights:
• Risk-based approach
encouraged
• 5 control levels
Over-regulation can stifle innovation
Conclusions from a recent workshop on Cloud Security and certification
• Trust and security are key to the successful adoption of cloud computing and its ability to drive
European economic expansion,
• Urgently gain clarity in the implementation of newly introduced regulatory regimes
• Promote the use of existing certification schemes and standards
• Raise awareness of cloud security and ensure understanding of what cloud security means
• Support the Free Flow of Data
To end…
• Recommendations for Future Policy Action
– What does cloud mean? – automation
– What would destroy cloud – over regulation and interruptions in automated interactions
– Flexibility to allow innovative services to develop
– Where possible use open standards and approaches more generally to allow transparency
• Technology solutions including the unification of trusted and cloud computing may break the need to
trust you provider
– May end up with no-one able to see inside though…

More Related Content

PDF
Bb20151019 trusted cloud-rennes-final
PDF
Competition law update - In house lawyers forum 2015, Matthew Woodford
PPTX
Accelerator Enduring Challenge briefing: Cambridge Enterprise
PDF
Privacy and Electronic Communications Regulation - Elaine McKinney
PPTX
About patent
PPTX
Role of dual-use programmes to accelerate innovation and competitiveness
PPT
Leveling the playing field for open source in education and public sector
PDF
"How are SMEs addressing privacy and trust today and what do they need to kno...
Bb20151019 trusted cloud-rennes-final
Competition law update - In house lawyers forum 2015, Matthew Woodford
Accelerator Enduring Challenge briefing: Cambridge Enterprise
Privacy and Electronic Communications Regulation - Elaine McKinney
About patent
Role of dual-use programmes to accelerate innovation and competitiveness
Leveling the playing field for open source in education and public sector
"How are SMEs addressing privacy and trust today and what do they need to kno...

What's hot (17)

PPT
Cyber Tech Corporate
PPTX
Introduction to the Centre for Defence Enterprise and introducing the Defence...
PDF
DASA: FASS 2: Overview of DASA
PDF
FTTH Demand Drivers
PPTX
Accelerator autonomous last mile resupply - how to work with the Accelerator
PPTX
Innovation fund themed competition webinar - session 4
PPTX
Accelerator Autonomous Last Mile Resupply - DASA overview
PPT
Malaysia Combat Web Spam By Elioe Com
PPTX
Accelerator Autonomous last mile resupply: short form contract - 23 May 2017
PPTX
My Privacy at Risk, is it Safe?
PPTX
Prevent million dollar fines - preparing for the EU General Data Regulation
PDF
Blythe Robertson Scotland S E Care Programme Blythe Robertson
PPTX
Jisc trust and identity update
PPTX
Some analyst references for video marketing stats
PPTX
Jump start EU Data Privacy Compliance with Data Classification
PPTX
Internet Society (ISOC Uk England) Webinar on User Trust
PPT
Friendly WiFi Scheme
Cyber Tech Corporate
Introduction to the Centre for Defence Enterprise and introducing the Defence...
DASA: FASS 2: Overview of DASA
FTTH Demand Drivers
Accelerator autonomous last mile resupply - how to work with the Accelerator
Innovation fund themed competition webinar - session 4
Accelerator Autonomous Last Mile Resupply - DASA overview
Malaysia Combat Web Spam By Elioe Com
Accelerator Autonomous last mile resupply: short form contract - 23 May 2017
My Privacy at Risk, is it Safe?
Prevent million dollar fines - preparing for the EU General Data Regulation
Blythe Robertson Scotland S E Care Programme Blythe Robertson
Jisc trust and identity update
Some analyst references for video marketing stats
Jump start EU Data Privacy Compliance with Data Classification
Internet Society (ISOC Uk England) Webinar on User Trust
Friendly WiFi Scheme
Ad

Similar to Privacy and Security policies in the cloud (20)

PPSX
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
PDF
Cyril Bartolo: European Users’ recommendations for the success of Public Clou...
PPT
Contracting in the Cloud by Tammy Bortz
PDF
Cloud primer
PDF
Frukostseminarium om molntjänster
PDF
Cybersecurity and Data Privacy Update
PPTX
ENISA-EuroCloud-Forum-2015.pptx
PPTX
Juan miguel-velasco-lopez-urda-enisa-euro cloud-forum-2015(1)
PDF
Ian walden - data protection in cloud computing
PDF
Privacy and the GDPR: How Cloud computing could be your failing
PDF
Security Issues for Cloud Applications
PDF
EuroCACS 2016 There are giants in the sky
PDF
Cloud Security Governance
PDF
12 02-14 information security managers - unannotated
PPTX
Guide to security patterns for cloud systems and data security in aws and azure
PPT
Cloud Computing and the Public Sector
PPT
Cloud security
PPTX
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
PDF
Is your cloud GDPR compliant?
PPT
Cloud computing-security-issues
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Cyril Bartolo: European Users’ recommendations for the success of Public Clou...
Contracting in the Cloud by Tammy Bortz
Cloud primer
Frukostseminarium om molntjänster
Cybersecurity and Data Privacy Update
ENISA-EuroCloud-Forum-2015.pptx
Juan miguel-velasco-lopez-urda-enisa-euro cloud-forum-2015(1)
Ian walden - data protection in cloud computing
Privacy and the GDPR: How Cloud computing could be your failing
Security Issues for Cloud Applications
EuroCACS 2016 There are giants in the sky
Cloud Security Governance
12 02-14 information security managers - unannotated
Guide to security patterns for cloud systems and data security in aws and azure
Cloud Computing and the Public Sector
Cloud security
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Is your cloud GDPR compliant?
Cloud computing-security-issues
Ad

More from David Wallom (20)

PPTX
Quantifying the impact of green leasing on energy use in a retail portfolio: ...
PPTX
Trust and Cloud computing, removing the need for the consumer to trust their ...
PPTX
Trust and Cloud computing, removing the need for the consumer to trust their ...
PPTX
The University of Oxford e-Research Centre
PPTX
Introduction to Cloud Computing
PPTX
Benefits of big data analytics in Smart Metering, ADEPT, WICKED and beyond
PPTX
Smarter Energy, Infrastruture service, consumtion analytics and applications
PPTX
The Climateprediction.net programme, big data climate modelling
PPTX
1990-2050 sulphur dioxide emissions data from ECLIPSE v5a for use in Met Offi...
PPTX
Supporting Research through "Desktop as a Service" models of e-infrastructure...
PPTX
e-Research & the art of linking Astrophysics to Deforestation
PPTX
Working with Earth Observation Data, INFORM and the IEA
PPTX
WICKED - Working with the data rich
PPTX
Mapping Priorities and Future Collaborations for you Projects
PPTX
CloudWatch: Mapping priorities and future collaboration for your project
PPTX
Trust and Cloud Computing, removing the need to trust your cloud provider
PPTX
CloudWatch2 Adoption Deep Dive
PPTX
e-infrastructural needs to support informatics
PPTX
Generating Insight from Big Data
PPTX
International Forest Risk Model
Quantifying the impact of green leasing on energy use in a retail portfolio: ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
The University of Oxford e-Research Centre
Introduction to Cloud Computing
Benefits of big data analytics in Smart Metering, ADEPT, WICKED and beyond
Smarter Energy, Infrastruture service, consumtion analytics and applications
The Climateprediction.net programme, big data climate modelling
1990-2050 sulphur dioxide emissions data from ECLIPSE v5a for use in Met Offi...
Supporting Research through "Desktop as a Service" models of e-infrastructure...
e-Research & the art of linking Astrophysics to Deforestation
Working with Earth Observation Data, INFORM and the IEA
WICKED - Working with the data rich
Mapping Priorities and Future Collaborations for you Projects
CloudWatch: Mapping priorities and future collaboration for your project
Trust and Cloud Computing, removing the need to trust your cloud provider
CloudWatch2 Adoption Deep Dive
e-infrastructural needs to support informatics
Generating Insight from Big Data
International Forest Risk Model

Recently uploaded (20)

PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Cloud computing and distributed systems.
PDF
Empathic Computing: Creating Shared Understanding
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Big Data Technologies - Introduction.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
KodekX | Application Modernization Development
PPTX
A Presentation on Artificial Intelligence
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Dropbox Q2 2025 Financial Results & Investor Presentation
Cloud computing and distributed systems.
Empathic Computing: Creating Shared Understanding
Review of recent advances in non-invasive hemoglobin estimation
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Big Data Technologies - Introduction.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Spectral efficient network and resource selection model in 5G networks
Mobile App Security Testing_ A Comprehensive Guide.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
20250228 LYD VKU AI Blended-Learning.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
“AI and Expert System Decision Support & Business Intelligence Systems”
KodekX | Application Modernization Development
A Presentation on Artificial Intelligence
Bridging biosciences and deep learning for revolutionary discoveries: a compr...

Privacy and Security policies in the cloud

  • 1. 1 Analysing the Current Data Protection Legal Framework: challenges and ways forward Privacy policies for the cloud Prof David Wallom
  • 2. Overview • Worried? should you be? • Its all about trust • Bolster trust or make it so we don’t need it…
  • 3. Why all this worry?
  • 4. Why all this worry? – Cloud computing is pervasive in modern society
  • 5. Cats, Kids and fun…
  • 6. Its not just all about cats and kids…
  • 8. Why all this worry? – Cloud computing is pervasive in modern society – Limited market penetration from EU cloud provider -> vast majority of cloud providers based outside EU
  • 9. Who are the cloud providers?
  • 10. Why all this worry? – Cloud computing is pervasive in modern society – Limited market penetration from EU cloud provider -> vast majority of cloud providers based outside EU – Pace of service development and nefarious capability outstrips that of the regulatory environment
  • 11. What should you think about when… Who are you entering into a contract with? What protections does your contract give you? Who can make changes to the T&C? Where is the data? On whom is the liability?
  • 12. 7 Cloud Computing security risks
  • 13. Trust at the Last Mile • Problem for high value instantly usable data and services – Critical data or keys are still exposed inside the cloud at the final steps – Still require customers unconditional trust of their CSP
  • 14. “What is really going on inside the cloud?”
  • 16. New Industries Around Security and Trust
  • 18. Approach: Government procurement framework Highlights: • Based on ISO 27001 • Most data is “official” • Reusable certification European Union: ENISA CCSL and CCSM Approach: Procurement guidance Highlights: • Maps certification regimes relevant to cloud customers Notable strength: • Flexible Notable strength: • Standards-based Notable strength: • Transparent Notable strength: • Risk-based Public sector approaches to cloud security Approach: Government procurement framework Highlights: • Based on NIST 800- 53v4 • Moderate and High baseline controls Approach: Government procurement guidance Highlights: • Risk-based approach encouraged • 5 control levels
  • 20. Conclusions from a recent workshop on Cloud Security and certification • Trust and security are key to the successful adoption of cloud computing and its ability to drive European economic expansion, • Urgently gain clarity in the implementation of newly introduced regulatory regimes • Promote the use of existing certification schemes and standards • Raise awareness of cloud security and ensure understanding of what cloud security means • Support the Free Flow of Data
  • 21. To end… • Recommendations for Future Policy Action – What does cloud mean? – automation – What would destroy cloud – over regulation and interruptions in automated interactions – Flexibility to allow innovative services to develop – Where possible use open standards and approaches more generally to allow transparency • Technology solutions including the unification of trusted and cloud computing may break the need to trust you provider – May end up with no-one able to see inside though…

Editor's Notes

  • #15: How to effectively verify “what is really going on inside the cloud”. Whether the acquired Cloud services are enforced; Whether only the acquired Cloud services are accessing customers’ data.
  • #19: In addition to developing cloud strategies, various countries and regions are taking the next step of developing cloud security requirements for government services or even as national policies. Each of their approaches have varying strengths from which countries can learn as they develop requirements and iterate going forward. With its Cloud Strategy, NIS Directive, and the Digital Single Market strategy, the EU is pushing the importance of innovation, security, and resilience. While it is still unclear what the final form of the NIS Directive will be, it is likely that the Directive will encourage regulation that affects cloud service providers. In addition to being innovative, it is important that such regulation ultimately considers the other principles mentioned here today, including flexible, data-aware, risk-based, global standards-based, and transparent. Using these principles will ensure that countries are able to implement the regulations in the way that makes the most sense for them and that workable requirements ultimately result. A good first step is the EU’S Cloud Certifications Schemes List and Cloud Certification Schemes Metaframework, which are flexible tools that cloud customers can use to guide their procurement of secure and resilient cloud services. The UK’s G-Cloud program, in addition to demonstrating data awareness, is global standards-based, utilizing ISO 27001 as its basis and adding only a thin layer of unique requirements. In addition, G-Cloud takes the standards-based principle a step further in creating a reusable certification, which results in efficiencies similar to those achieved by utilizing global standards. It is also flexible, with multiple levels of certification possible, allowing government agencies to choose which level meets their needs. In the US, FedRAMP has been developed and improved through consultation with cloud service providers, enabling important transparency. FedRAMP is also fairly flexible, as Moderate and High baselines are being developed, and government agencies will be able to choose which certification levels make sense for their varying data and services. However, as FedRAMP layers many controls and control parameters on top of NIST 800-53 rev. 4, it could be improved by being more risk-based and global standards-based. In Australia, the Department of Defence has developed a new Information Security Manual, encouraging Australian government agencies to use its manual by taking a risk-based approach in evaluating which of the controls it outlines are important for their cybersecurity and cloud security. It also demonstrates data awareness, mapping the controls to five levels of data sensitivity (from a baseline level to top secret). In conjunction with the new cloud policy allowing agencies to determine for themselves whether to host data offshore, this policy enables flexibility.