SlideShare a Scribd company logo
Securing The Clouds
with
The Standard Best Practices
Chinatu Uzuegbu
CISSP, CCISO, CISM, CISA, CEH, ….
Managing Cyber Security Consultant
RoseTech CyberCrime Solutions Ltd.
❖Content Contributor.
❖Security Congress Event Advisory
Committee.
❖Chapters Advisory Committee(CAC).
❖Blogger.
❖Authorized Instructor.
❖Founding Past President , Nigeria
Chapter.
Chinatu Uzuegbu
Managing Cyber Security Consultant, RoseTech CyberCrime Solutions Limited
https://www.linkedin.com/in/chinatu-uzuegbu-67593119/
https://de.slideshare.net/Chinatu
Volunteering
VigiTrust Chartered Advisory Board.
❖Global Speaker, Mentor, Volunteer and
Delegate.
❖Over 20 years wealth of experience as an
IT/Cyber Security Professional
Professional
❖CISSP, CCISO, CISM, CISA, CEH, Others.
❖Top 50 Women in Cyber Security , Africa, 2020.
Educational
❖Honorary Doctorate, London Graduate School.
❖MSc. Information Systems Management,
University of Liverpool.
❖Bsc. Computer Science/Maths, University of
Port Harcourt.
❖Global Conference Speaker.
❖Global Ambassador.
❖Mentor.
The Cloud in The New Normal
● 94% of enterprises use cloud services.
● 67% of enterprise infrastructure is now cloud-based.
● 92% of businesses have a multi-cloud strategy in place or in
the works.
● The global cloud computing industry has a market size of
$480.04 billion, as of 2022.
● The U.S. public cloud market is projected to reach $206.1
billion by the end of 2022.
https://www.zippia.com/advice/cloud-adoption-statistics/
● The Concept of Cloud Computing.
● The Cloud computing Reference Architecture.
● Business Motivations for Adopting The Cloud Tech.
● Characteristics of The Authentic Cloud.
● Regulations and Frameworks for an Authentic Cloud Service
Provider.
● The Cloud Service Model of Your choice.
● The Cloud Deployment Model of Your Choice.
● Securing The Cloud with The Standard Best Practices and
Frameworks.
● Conclusion.
Securing The Cloud
with The Standard
Best Practices is
Our Obligation!
The Concept of Cloud Computing
(NIST 800-145)
Minimal
Management
Efforts
or
Service
Provider’s
Interactions.
Ubiquitous convenient Broad Band Network Access
Rapidly Provisioned and Released
Shared
Pool
of
Configurable
Resources
(Networks,
Servers,
Storage,
Applications,
Databases,
Repositories,
Platforms,
Services
and
others)
Cloud Computing
The Cloud Computing Reference Architecture(CCRA):
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication500-292.pdf
Cloud
Service
Entity
Description Alias
Cloud Service
provider(CSP)
Provisioning and processing the
Cloud resources for customers.
Data
Processor
Cloud Service
Customer(CSC
)
Opt-in Cloud Service Subscriber
consuming the services offered by
the Cloud Provider.
Data
Controller/Dat
a Owner
Cloud Service
Broker(CASB)
The Middle man offering a
catalogue of Cloud Services from
Cloud Providers to Customers.
Identity
Provider,
Intermediary
Cloud
Auditor(CA)
Overseeing the cloud processes
to assure compliance and
necessary attestations(TPA) in
mind.
Auditor
Third Party
Attester(TPA).
Others Cloud Business Mgr, Cloud
Service Integrator, Cloud Service
Admin, Inter Cloud Provider, others
Business Motivators for Adopting The Cloud Tech
Speed
Scalability
Cost
Reduced
cost of
Capital and
Operating
Expenses
Rapid Provisioning and
seamless Operations
Agility with less Administrative
Bottle-necks.
❖Outline the Key Business
processes.
❖Align the Pointers and
critical paths with a workable
Business Case and Cost
Benefit Analysis.
❖Involve the Asset or
Process Owner and your
Security Steering Committee.
Attributes of an Authentic Cloud Service Provider
The Authentic Cloud
Broad Band
Network Access
Rapid Elasticity
CSA
STAR
CSA
CAIQ
Regulations and Frameworks for an Authentic Cloud Service Provider
S/N Regulation/Framework Web-Site
1 NIST 800-145(Cloud Computing) https://csrc.nist.gov/publications/detail/sp/800-145/final
2 Cloud Computing Reference Architecture https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication500-292.pdf
https://aistandardshub.org/ai-standards/information-technology-cloud-computing-vocabulary/
3 Cloud Security Alliance Consensus Assessments Initiative
Questionnaire and Cloud Control Model
https://cloudsecurityalliance.org/research/cloud-controls-matrix/
https://cloudsecurityalliance.org/blog/2020/10/16/what-is-the-cloud-controls-matrix-ccm/
4 CSA STAR(Security, Trust, and Assurance Registry Levels(
Self-Assessment, Certifications, Continuous Monitoring)
https://cloudsecurityalliance.org/star/registry/
5 Statement on Standards for Attestation Engagements(SSAE
18(SOC2 &SOC3)
https://ssae-16.com/ssae-16/the-ssae-18-audit-standard/
https://kfinancial.com/what-you-need-to-know-about-ssae-18-reports/
6 ISO 31000 on Risk Management https://www.iso.org/iso-31000-risk-management.html
7 ENISA(Cloud Risk Frameworks)
European Union Agency for Cyber Security
https://www.enisa.europa.eu/topics/cloud-and-big-data/cloud-security/enisa-cloud-computing-risk-assessment.
https://www.clubcloudcomputing.com/top-8-cloud-security-risks-according-enisa/
8 ISO 27018-Cloud Data Privacy https://www.itgovernance.co.uk/iso-27017-and-iso-27018
9 Privacy Regulations on PII GDPR, HIPAA, GLBA, PIPEDA, NDPR , PCI-DSS and others
10 FIPS-140(Cryptographic Modules) https://csrc.nist.gov/publications/detail/fips/140/2/final
11 ISO 28000-Supply Chain Security Management https://www.scribd.com/document/441398920/ISO-28000-pdf
12 ISO 27001:2022-Security and Compliance https://www.scribd.com/document/561930847/Main-Changes-in-ISO-27001-2022
The Cloud Service Models
Service Model Description Advantages Disadvantages Potential
Customer
Infrastructure As a
Service
•CPU
•RAM
•Networks
•Storage
•Memory
•Servers
•Others
•Reduced cost of Asset Ownership, pram
location, IT personnel and others.
•Pay As you Go.
•FIPS-140 HSM Cryptographic Module.
•Customer has the highest level of control
around Patching, Operating Systems,
Applications and Data.
•Loss of total control around
the physical environ and Data
Center, hardware, networks
and other infrastructures.
•Manual Scaling
IT Operations
Platform As a
Service
•IaaS
•The host
•Operating System(OS)
•Runtime Engines
•Dev. environments
•Programming
Languages.
•Databases
•Others
•IaaS but Customer has control only around
the development environment, the
applications running on it and the data being
processed.
•Auto-Scaling
•Seamless BCDR
• IaaS +
•Challenge with Vendor Lock-
in/Lock-out.
•Software Developer
•Database
Administrator.
Software As a
Service
•IaaS + PaaS
•Applications
•IaaS+PaaS but Customer has control only
around the Data and the Software licensing of
the Applications processing the customer’s
data.
•IaaS +PaaS +
•Issues with Data disposal
and destruction.
• Data Analyst
•Data Processor
The Cloud Service Models Cont’d
Chart of responsibilities
Responsibility On-Premise IaaS PaaS SaaS
Data
Applications
Operating System
Runtime
Middle ware
Virtualization
Servers
Storage
Networking
Physical Activity
Customer Provider
The Cloud Deployment Model of Your Choice
Model Description Advantages Disadvantages Customer
Private Dedicated to the Customer and
in some cases deployed on the
premise of the customer.
•Focused Control.
•Mostly for top secret and highly
regulated Subscribers.
• Quite Expensive to deploy.
•Accessing Data remotely could
be difficult.
•Regulatory Bodies.
•Top Governing Bodies.
•Military and other Forces.
Public Publicly available to anyone that
subscribes. It is also required for
seamless BCDR, Test
environments, file sharing and
others.
•Quite cheap and affordable.
•High availability of data center pool of
resources.
•Virtualization, Agility for customers.
•On-demand provisioning, Outsourcing
of enterprise IT infrastructures.
•BCDR
•Minimal control of Customers
resources.
•Subject to threats of Spoofing,
Data tampering, repudiation,
Information Disclosure, Denial of
Service and escalation of
Privilege.
•Dropbox, Gmail, iCloud, Google
Drive.,One Note,Yahoo,
Facebook,, OneDrive,
Application Development.,
Application Testing,
File sharing, Email
Hybrid A mix of one or two deployment
models, mostly a mix of Private +
Public Clouds or On Premise +
Public Cloud. Usually applied
during bursts of sales for
outsourcing Rapid elasticity in
Publc Cloud.
•A good economical fix for periodic on
high demand sales where another
deployment Model is required to add to
the existing model or on premise .
• Issues of Inter-operability due to
complicated technology.
•Jumia + AWS
•On Premise Production + Public
Cloud Deployment.
•Others
Community Mostly applied for subscribers
with common goal for example
an Alumni Class of a University,
forum of all Cloud Security Pros.
• Focused control.
•Shared Computing Resources.
•Multiple Organizaions
•Identity Management and
Authentications Issues
•Communities with shared goal.
•Whatsapp groups
•Federated Identities
Summary of Cloud Deployment Models
Public
Supports All
Users
Software &
Hardware
testing
Subscription
App Dev &
Testing
File Sharing
Private
Single Org.
Managed internally
or by service
provider
More
Expensive
Tighter
Security
Better Privacy
Hybrid
Interconnected
Infrastructure
Enterprise, Private
and Public Cloud
Can scale
rapidly
Cloud Bursting
Peak sales
Community
Shared
Resources
Multiple Orgs.
Community of
Works
Example
Universities
Cloud Security
Association
Securing The Cloud with The Standard Best Practices
Infrastructures Security
Host Security
Applications Security
Data Security
Operations Security
•Virtualization
•Hypervisor
•Virtual machines
•Virtual Instance
•Multiple Jurisdictions
•Hardware Security Module.
•Volume & Object Storage
•Computing
•Networking
•Memory
•Application Programming
Interface(API)
Portability
Inter-Operability
Reversibility
Recoverability
Data Encryption
Data Loss Prevention
Data Disposal
Data Rights Mgt.
Info Rights mgt.
Intellectual Properties
E-discovery
Forensics
Software Testing
Penetration Testing
Dynamic Testing
Static App Testing
Databases
Uptime Institute
Cabling
Fire Protection
Business continuity
Disaster Recovery
Configuration Mgt.
Incident Mgt.
Change Mgt.
Problem Mgt.
Integrations
Automations
Patch Mgt
Deployment Mgt
Release Mgt.
VM Maintenance.
Back-ups
•Confidentialit
y
•Process
Integrity
•Availability
•Privacy
•Security
•Safety
•Authenticity
•Resiliency
•Redundancy
Supply Chain
Security
•Multi-layered
Security
Laws, Ethical &
Legal
Proceedings
Contract terms
Service Level Agreement
Due Diligence
Due Care
Multiple Jurisdictions
Data Protection Regulation
Privacy Regulations(ISO 27018),
others
Holistic Security-ISO 27001
Cloud Control Matrix
ENISA
CSA CAIQ
CSA STAR
SOC 2
SOC 3
Third Party Attestations
ISO 31000-Risk Mgt.
Conclusion
❖ Due Diligence and Due Care right from the decision-making and planning stage.
❖ What Cloud Computing Entails as stated in NIST 800-145 and CCRA(please review the slides and download the frameworks).
❖ Collaborate with the Security Steering Committee/Key Players to ascertain the Business Drivers with desired Cost Benefit Analysis.
❖ The Characteristics that attest for an Authentic Cloud Provider, refer to the Cloud Security Alliance CAIQ, STAR, SSAE-SOCs 2 and 3, and
other frameworks.
❖ Hire a reliable Third Party Auditor for CSP’s Attestations and Certifications.
❖ Work with Frameworks, Privacy Regulations, Contractual Regulations, Data Protection Regulations and other Regulatory Requirements.
❖ Clarify Issues of Multiple Jurisdictions especially on the location the Cloud Service is hosted.
❖ The Threats and Risks around each Cloud Service and Deployment Model.
❖ The Security Measures to apply around each Model.
❖ The Objective is to assure an acceptable level of Confidentiality, Integrity, Availability, Privacy, Authenticity, Resiliency and Security around
the Cloud Technology.
❖ The Customer is the Data Owner and accountable/liable to any kind of Data Losses.
❖ The Contract and Service Level agreement must be explicit .
❖ PAY ATTENTION TO DUE DILIGENCE and DUE CARE
To Secure The Clouds with The Standard Best Practices:
Thank You!
Chinatu Uzuegbu
CISSP, CCISO, CISM, CISA, CEH,….
Managing Cyber Security Consultant
RoseTech Cybercrime Solutions Limited
chinatuuzuegbu@outlook.com
https://www.linkedin.com/in/chinatu-uzuegbu-67593119/
https://de.slideshare.net/Chinatu

More Related Content

PPTX
Securing The Clouds Proactively-BlackisTech.pptx
PDF
Securing The Journey To The Cloud
PPTX
Cloud Security using NIST guidelines
PPTX
Cloud Security using NIST guidelines
PPT
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
PPT
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
PDF
Fundamentals for Stronger Cloud Security2.pdf
PPT
4831586.ppt
Securing The Clouds Proactively-BlackisTech.pptx
Securing The Journey To The Cloud
Cloud Security using NIST guidelines
Cloud Security using NIST guidelines
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Fundamentals for Stronger Cloud Security2.pdf
4831586.ppt

Similar to Securing The Clouds with The Standard Best Practices-1.pdf (20)

PPTX
Transforming cloud security into an advantage
PPT
Effectively and Securely Using the Cloud Computing Paradigm
PPTX
Cloud is not an option, but is security?
PPT
Cloud Security Alliance's GRC Stack Overview
PPTX
dtechnClouologyassociatepart2
PDF
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
PDF
R1. John W. RittinghouseCloud Computing Implementation, Management, and Secur...
PPTX
Cloud security Presentation
PPTX
Cloud monitoring overview
PPTX
gkkCloudtechnologyassociate(cta)day 2
PPT
cloudintro-lec018.1.ppt
PPTX
Cloud Computing Security Frameworks - our view from exoscale
PPTX
Cloud Security
PPTX
Cloud Security
PDF
MISA Cloud workshop - Cloud 101
PPTX
40369A Microsoft Cloud Fundamentals - Chapter 1
PPTX
Cloud computing arma_nnj
PPTX
(ISC)2 CCSP - Certified Cloud Security Professional
PPTX
MARLABS - Cloud services CIO Conference
PDF
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Transforming cloud security into an advantage
Effectively and Securely Using the Cloud Computing Paradigm
Cloud is not an option, but is security?
Cloud Security Alliance's GRC Stack Overview
dtechnClouologyassociatepart2
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
R1. John W. RittinghouseCloud Computing Implementation, Management, and Secur...
Cloud security Presentation
Cloud monitoring overview
gkkCloudtechnologyassociate(cta)day 2
cloudintro-lec018.1.ppt
Cloud Computing Security Frameworks - our view from exoscale
Cloud Security
Cloud Security
MISA Cloud workshop - Cloud 101
40369A Microsoft Cloud Fundamentals - Chapter 1
Cloud computing arma_nnj
(ISC)2 CCSP - Certified Cloud Security Professional
MARLABS - Cloud services CIO Conference
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Ad

More from Chinatu Uzuegbu (18)

PDF
Business Process Revamp is Paramount in 2024.pdf
PDF
Preventing Cloud Data Breaches.pdf
PDF
World Password Management Day, 2023.pdf
PPTX
The Nigerian Cybersecurity Space-How Regulated Are We?
PDF
Effectiveness of Cyber Security Awareness.pdf
PDF
What The Cyber Entails-2.pdf
PDF
What The Cyber Entails-1.pdf
PDF
Combating Cyber Crimes Proactively.pdf
PDF
Identity & Access Management Day 2022.pdf
PDF
Combating cyber crimes chinatu
PDF
Understanding Identity Management and Security.
PDF
Practical approach to combating cyber crimes
PPSX
Cyber Security Awareness Month 2017-Wrap-Up
PPSX
Cyber Security Awareness Month 2017-Nugget 6
PDF
Cyber crime (prohibition,prevention,etc)_act,_2015
PPSX
Cyber Security Awareness Month 2017-Nugget 3
PPSX
Cyber Security Awareness Month 2017- Nugget2
PPSX
Cyber Security Awareness Month 2017
Business Process Revamp is Paramount in 2024.pdf
Preventing Cloud Data Breaches.pdf
World Password Management Day, 2023.pdf
The Nigerian Cybersecurity Space-How Regulated Are We?
Effectiveness of Cyber Security Awareness.pdf
What The Cyber Entails-2.pdf
What The Cyber Entails-1.pdf
Combating Cyber Crimes Proactively.pdf
Identity & Access Management Day 2022.pdf
Combating cyber crimes chinatu
Understanding Identity Management and Security.
Practical approach to combating cyber crimes
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Nugget 6
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017
Ad

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
A Presentation on Artificial Intelligence
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
cuic standard and advanced reporting.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation theory and applications.pdf
PPT
Teaching material agriculture food technology
Per capita expenditure prediction using model stacking based on satellite ima...
Unlocking AI with Model Context Protocol (MCP)
20250228 LYD VKU AI Blended-Learning.pptx
Understanding_Digital_Forensics_Presentation.pptx
Approach and Philosophy of On baking technology
Chapter 3 Spatial Domain Image Processing.pdf
Machine learning based COVID-19 study performance prediction
A Presentation on Artificial Intelligence
Spectral efficient network and resource selection model in 5G networks
The Rise and Fall of 3GPP – Time for a Sabbatical?
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
cuic standard and advanced reporting.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation theory and applications.pdf
Teaching material agriculture food technology

Securing The Clouds with The Standard Best Practices-1.pdf

  • 1. Securing The Clouds with The Standard Best Practices Chinatu Uzuegbu CISSP, CCISO, CISM, CISA, CEH, …. Managing Cyber Security Consultant RoseTech CyberCrime Solutions Ltd.
  • 2. ❖Content Contributor. ❖Security Congress Event Advisory Committee. ❖Chapters Advisory Committee(CAC). ❖Blogger. ❖Authorized Instructor. ❖Founding Past President , Nigeria Chapter. Chinatu Uzuegbu Managing Cyber Security Consultant, RoseTech CyberCrime Solutions Limited https://www.linkedin.com/in/chinatu-uzuegbu-67593119/ https://de.slideshare.net/Chinatu Volunteering VigiTrust Chartered Advisory Board. ❖Global Speaker, Mentor, Volunteer and Delegate. ❖Over 20 years wealth of experience as an IT/Cyber Security Professional Professional ❖CISSP, CCISO, CISM, CISA, CEH, Others. ❖Top 50 Women in Cyber Security , Africa, 2020. Educational ❖Honorary Doctorate, London Graduate School. ❖MSc. Information Systems Management, University of Liverpool. ❖Bsc. Computer Science/Maths, University of Port Harcourt. ❖Global Conference Speaker. ❖Global Ambassador. ❖Mentor.
  • 3. The Cloud in The New Normal ● 94% of enterprises use cloud services. ● 67% of enterprise infrastructure is now cloud-based. ● 92% of businesses have a multi-cloud strategy in place or in the works. ● The global cloud computing industry has a market size of $480.04 billion, as of 2022. ● The U.S. public cloud market is projected to reach $206.1 billion by the end of 2022. https://www.zippia.com/advice/cloud-adoption-statistics/
  • 4. ● The Concept of Cloud Computing. ● The Cloud computing Reference Architecture. ● Business Motivations for Adopting The Cloud Tech. ● Characteristics of The Authentic Cloud. ● Regulations and Frameworks for an Authentic Cloud Service Provider. ● The Cloud Service Model of Your choice. ● The Cloud Deployment Model of Your Choice. ● Securing The Cloud with The Standard Best Practices and Frameworks. ● Conclusion. Securing The Cloud with The Standard Best Practices is Our Obligation!
  • 5. The Concept of Cloud Computing (NIST 800-145) Minimal Management Efforts or Service Provider’s Interactions. Ubiquitous convenient Broad Band Network Access Rapidly Provisioned and Released Shared Pool of Configurable Resources (Networks, Servers, Storage, Applications, Databases, Repositories, Platforms, Services and others) Cloud Computing
  • 6. The Cloud Computing Reference Architecture(CCRA): https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication500-292.pdf Cloud Service Entity Description Alias Cloud Service provider(CSP) Provisioning and processing the Cloud resources for customers. Data Processor Cloud Service Customer(CSC ) Opt-in Cloud Service Subscriber consuming the services offered by the Cloud Provider. Data Controller/Dat a Owner Cloud Service Broker(CASB) The Middle man offering a catalogue of Cloud Services from Cloud Providers to Customers. Identity Provider, Intermediary Cloud Auditor(CA) Overseeing the cloud processes to assure compliance and necessary attestations(TPA) in mind. Auditor Third Party Attester(TPA). Others Cloud Business Mgr, Cloud Service Integrator, Cloud Service Admin, Inter Cloud Provider, others
  • 7. Business Motivators for Adopting The Cloud Tech Speed Scalability Cost Reduced cost of Capital and Operating Expenses Rapid Provisioning and seamless Operations Agility with less Administrative Bottle-necks. ❖Outline the Key Business processes. ❖Align the Pointers and critical paths with a workable Business Case and Cost Benefit Analysis. ❖Involve the Asset or Process Owner and your Security Steering Committee.
  • 8. Attributes of an Authentic Cloud Service Provider The Authentic Cloud Broad Band Network Access Rapid Elasticity CSA STAR CSA CAIQ
  • 9. Regulations and Frameworks for an Authentic Cloud Service Provider S/N Regulation/Framework Web-Site 1 NIST 800-145(Cloud Computing) https://csrc.nist.gov/publications/detail/sp/800-145/final 2 Cloud Computing Reference Architecture https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication500-292.pdf https://aistandardshub.org/ai-standards/information-technology-cloud-computing-vocabulary/ 3 Cloud Security Alliance Consensus Assessments Initiative Questionnaire and Cloud Control Model https://cloudsecurityalliance.org/research/cloud-controls-matrix/ https://cloudsecurityalliance.org/blog/2020/10/16/what-is-the-cloud-controls-matrix-ccm/ 4 CSA STAR(Security, Trust, and Assurance Registry Levels( Self-Assessment, Certifications, Continuous Monitoring) https://cloudsecurityalliance.org/star/registry/ 5 Statement on Standards for Attestation Engagements(SSAE 18(SOC2 &SOC3) https://ssae-16.com/ssae-16/the-ssae-18-audit-standard/ https://kfinancial.com/what-you-need-to-know-about-ssae-18-reports/ 6 ISO 31000 on Risk Management https://www.iso.org/iso-31000-risk-management.html 7 ENISA(Cloud Risk Frameworks) European Union Agency for Cyber Security https://www.enisa.europa.eu/topics/cloud-and-big-data/cloud-security/enisa-cloud-computing-risk-assessment. https://www.clubcloudcomputing.com/top-8-cloud-security-risks-according-enisa/ 8 ISO 27018-Cloud Data Privacy https://www.itgovernance.co.uk/iso-27017-and-iso-27018 9 Privacy Regulations on PII GDPR, HIPAA, GLBA, PIPEDA, NDPR , PCI-DSS and others 10 FIPS-140(Cryptographic Modules) https://csrc.nist.gov/publications/detail/fips/140/2/final 11 ISO 28000-Supply Chain Security Management https://www.scribd.com/document/441398920/ISO-28000-pdf 12 ISO 27001:2022-Security and Compliance https://www.scribd.com/document/561930847/Main-Changes-in-ISO-27001-2022
  • 10. The Cloud Service Models Service Model Description Advantages Disadvantages Potential Customer Infrastructure As a Service •CPU •RAM •Networks •Storage •Memory •Servers •Others •Reduced cost of Asset Ownership, pram location, IT personnel and others. •Pay As you Go. •FIPS-140 HSM Cryptographic Module. •Customer has the highest level of control around Patching, Operating Systems, Applications and Data. •Loss of total control around the physical environ and Data Center, hardware, networks and other infrastructures. •Manual Scaling IT Operations Platform As a Service •IaaS •The host •Operating System(OS) •Runtime Engines •Dev. environments •Programming Languages. •Databases •Others •IaaS but Customer has control only around the development environment, the applications running on it and the data being processed. •Auto-Scaling •Seamless BCDR • IaaS + •Challenge with Vendor Lock- in/Lock-out. •Software Developer •Database Administrator. Software As a Service •IaaS + PaaS •Applications •IaaS+PaaS but Customer has control only around the Data and the Software licensing of the Applications processing the customer’s data. •IaaS +PaaS + •Issues with Data disposal and destruction. • Data Analyst •Data Processor
  • 11. The Cloud Service Models Cont’d Chart of responsibilities Responsibility On-Premise IaaS PaaS SaaS Data Applications Operating System Runtime Middle ware Virtualization Servers Storage Networking Physical Activity Customer Provider
  • 12. The Cloud Deployment Model of Your Choice Model Description Advantages Disadvantages Customer Private Dedicated to the Customer and in some cases deployed on the premise of the customer. •Focused Control. •Mostly for top secret and highly regulated Subscribers. • Quite Expensive to deploy. •Accessing Data remotely could be difficult. •Regulatory Bodies. •Top Governing Bodies. •Military and other Forces. Public Publicly available to anyone that subscribes. It is also required for seamless BCDR, Test environments, file sharing and others. •Quite cheap and affordable. •High availability of data center pool of resources. •Virtualization, Agility for customers. •On-demand provisioning, Outsourcing of enterprise IT infrastructures. •BCDR •Minimal control of Customers resources. •Subject to threats of Spoofing, Data tampering, repudiation, Information Disclosure, Denial of Service and escalation of Privilege. •Dropbox, Gmail, iCloud, Google Drive.,One Note,Yahoo, Facebook,, OneDrive, Application Development., Application Testing, File sharing, Email Hybrid A mix of one or two deployment models, mostly a mix of Private + Public Clouds or On Premise + Public Cloud. Usually applied during bursts of sales for outsourcing Rapid elasticity in Publc Cloud. •A good economical fix for periodic on high demand sales where another deployment Model is required to add to the existing model or on premise . • Issues of Inter-operability due to complicated technology. •Jumia + AWS •On Premise Production + Public Cloud Deployment. •Others Community Mostly applied for subscribers with common goal for example an Alumni Class of a University, forum of all Cloud Security Pros. • Focused control. •Shared Computing Resources. •Multiple Organizaions •Identity Management and Authentications Issues •Communities with shared goal. •Whatsapp groups •Federated Identities
  • 13. Summary of Cloud Deployment Models Public Supports All Users Software & Hardware testing Subscription App Dev & Testing File Sharing Private Single Org. Managed internally or by service provider More Expensive Tighter Security Better Privacy Hybrid Interconnected Infrastructure Enterprise, Private and Public Cloud Can scale rapidly Cloud Bursting Peak sales Community Shared Resources Multiple Orgs. Community of Works Example Universities Cloud Security Association
  • 14. Securing The Cloud with The Standard Best Practices Infrastructures Security Host Security Applications Security Data Security Operations Security •Virtualization •Hypervisor •Virtual machines •Virtual Instance •Multiple Jurisdictions •Hardware Security Module. •Volume & Object Storage •Computing •Networking •Memory •Application Programming Interface(API) Portability Inter-Operability Reversibility Recoverability Data Encryption Data Loss Prevention Data Disposal Data Rights Mgt. Info Rights mgt. Intellectual Properties E-discovery Forensics Software Testing Penetration Testing Dynamic Testing Static App Testing Databases Uptime Institute Cabling Fire Protection Business continuity Disaster Recovery Configuration Mgt. Incident Mgt. Change Mgt. Problem Mgt. Integrations Automations Patch Mgt Deployment Mgt Release Mgt. VM Maintenance. Back-ups •Confidentialit y •Process Integrity •Availability •Privacy •Security •Safety •Authenticity •Resiliency •Redundancy Supply Chain Security •Multi-layered Security Laws, Ethical & Legal Proceedings Contract terms Service Level Agreement Due Diligence Due Care Multiple Jurisdictions Data Protection Regulation Privacy Regulations(ISO 27018), others Holistic Security-ISO 27001 Cloud Control Matrix ENISA CSA CAIQ CSA STAR SOC 2 SOC 3 Third Party Attestations ISO 31000-Risk Mgt.
  • 15. Conclusion ❖ Due Diligence and Due Care right from the decision-making and planning stage. ❖ What Cloud Computing Entails as stated in NIST 800-145 and CCRA(please review the slides and download the frameworks). ❖ Collaborate with the Security Steering Committee/Key Players to ascertain the Business Drivers with desired Cost Benefit Analysis. ❖ The Characteristics that attest for an Authentic Cloud Provider, refer to the Cloud Security Alliance CAIQ, STAR, SSAE-SOCs 2 and 3, and other frameworks. ❖ Hire a reliable Third Party Auditor for CSP’s Attestations and Certifications. ❖ Work with Frameworks, Privacy Regulations, Contractual Regulations, Data Protection Regulations and other Regulatory Requirements. ❖ Clarify Issues of Multiple Jurisdictions especially on the location the Cloud Service is hosted. ❖ The Threats and Risks around each Cloud Service and Deployment Model. ❖ The Security Measures to apply around each Model. ❖ The Objective is to assure an acceptable level of Confidentiality, Integrity, Availability, Privacy, Authenticity, Resiliency and Security around the Cloud Technology. ❖ The Customer is the Data Owner and accountable/liable to any kind of Data Losses. ❖ The Contract and Service Level agreement must be explicit . ❖ PAY ATTENTION TO DUE DILIGENCE and DUE CARE To Secure The Clouds with The Standard Best Practices:
  • 16. Thank You! Chinatu Uzuegbu CISSP, CCISO, CISM, CISA, CEH,…. Managing Cyber Security Consultant RoseTech Cybercrime Solutions Limited chinatuuzuegbu@outlook.com https://www.linkedin.com/in/chinatu-uzuegbu-67593119/ https://de.slideshare.net/Chinatu