Understanding FISMA ISC2 CAP Certified Authorization Professional Donald

  • Slides: 33
Download presentation
Understanding FISMA & (ISC)2 CAP Certified Authorization Professional Donald E. Hester CISSP, CISA, CAP,

Understanding FISMA & (ISC)2 CAP Certified Authorization Professional Donald E. Hester CISSP, CISA, CAP, CRISC, MCT, MCITP, MCTS, MCSE Security, Security+, CTT+ 1 www. netcomlearning. com

Beyond The Six Steps in the RMF Categoriz e Monitor Select Authorize Implement Assess

Beyond The Six Steps in the RMF Categoriz e Monitor Select Authorize Implement Assess 2 www. netcomlearning. com

Cloud Computing Federal Cloud Computing Strategy “Cloud First policy” Image: NASA

Cloud Computing Federal Cloud Computing Strategy “Cloud First policy” Image: NASA

What is Cloud Computing? � The “Cloud” � Buzz word � Overused cliché �

What is Cloud Computing? � The “Cloud” � Buzz word � Overused cliché � Ill defined � Many different definitions � Marketing term � All hype � The “unknown path” � Service provider “____-as-a-service” � Nebulous 4 www. netcomlearning. com

Definition � “. . [a] model for enabling convenient, on-demand network access to a

Definition � “. . [a] model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e. g. networks, servers, storage, applications, services) that can be provisioned and released with minimal management effort or service provider interactions. ” � NIST �A 5 & Cloud Security Alliance utility model of technology delivery. www. netcomlearning. com

Definition � According to NIST the cloud model is composed of five essential characteristics,

Definition � According to NIST the cloud model is composed of five essential characteristics, three service models, and four deployment models. 6 www. netcomlearning. com

Essential Characteristics � On-demand self-service, customer driven utility � Broad network access, using standard

Essential Characteristics � On-demand self-service, customer driven utility � Broad network access, using standard networking � Resource pooling, economies of scale � Rapid elasticity, dynamic provisioning and releasing � Measured service, the ability to measure usage 7 www. netcomlearning. com

“____-as-a-service” (Service Models) � Software-as-a-Service (Saa. S)** � Platform-as-a-Service (Paa. S)** � Infrastructure-as-a-Service (Iaa.

“____-as-a-service” (Service Models) � Software-as-a-Service (Saa. S)** � Platform-as-a-Service (Paa. S)** � Infrastructure-as-a-Service (Iaa. S)** � Communication-as-a-Service (Caa. S) � Monitoring-as-a-Service (Maa. S) � Security-as-a-Service (SECaa. S) � Everything-as-a-Service (Eaa. S) � Anything-as-a-Service (Xaa. S) ** Defined by NIST 8 www. netcomlearning. com

Cloud Flavors (Deployment Models) � Private Cloud � Operated solely for one organization �

Cloud Flavors (Deployment Models) � Private Cloud � Operated solely for one organization � In-sourcing � Community � Operated � Public Cloud for a group of similar organizations Cloud � Outsourced � Multi-tenant � Hybrid Cloud � Combination 9 of the above www. netcomlearning. com

10 www. netcomlearning. com

10 www. netcomlearning. com

Potential Spending on Cloud Computing 11 www. netcomlearning. com

Potential Spending on Cloud Computing 11 www. netcomlearning. com

Reasons Efficiency Agility Innovatio n 12 www. netcomlearning. com

Reasons Efficiency Agility Innovatio n 12 www. netcomlearning. com

Benefits � Save time and money on provisioning new services � Less time spent

Benefits � Save time and money on provisioning new services � Less time spent on deployment � Move capital investment to operational expenses � Instant test bed � Enables IT systems to be scalable and elastic � Provision computing resources as required, on-demand � No need to own data center infrastructure (for public cloud service) 13 www. netcomlearning. com

Benefits � Energy saving (green) � Increased utilization, less idle time � Cost based

Benefits � Energy saving (green) � Increased utilization, less idle time � Cost based on usage � More effective use of capital resources ($) � Better service � Allows IT staff to focus on core competencies � Repurpose IT staff for more customer service � Outsource to esoteric experts � 24/7 service and support � Economies of scale 14 www. netcomlearning. com

Cloud Provider Benefits (NIST SP 800 -144) � They will have specialized staff �

Cloud Provider Benefits (NIST SP 800 -144) � They will have specialized staff � The platform will typically be more uniform � They have the ability to scale and add redundancy � Better backup and recovery � May support a greater number of mobile devices � Data may be centralized and not on laptops 15 www. netcomlearning. com

Benefits 16 www. netcomlearning. com

Benefits 16 www. netcomlearning. com

Cost Considerations Traditional Costs Capital Expenses Hardware (initial) Software (initial) Hardware repair/upgrades Software upgrades

Cost Considerations Traditional Costs Capital Expenses Hardware (initial) Software (initial) Hardware repair/upgrades Software upgrades Staff costs Energy costs Training Cloud Costs Operational Expenses Cost per user Cost by bandwidth/storage Cost increase over time Cost of additional services Legal consultation costs Staff costs Training Traditional Limits Maximum load Maximum up-time Maximum users MTTR Dependencies Cloud limitations Users Bandwidth Storage Service Support Dependencies 17 www. netcomlearning. com

Cost Benefit Analysis Example Traditional Costs TCO $21, 000 Cloud Costs TCO $22, 850

Cost Benefit Analysis Example Traditional Costs TCO $21, 000 Cloud Costs TCO $22, 850 14000 12000 10000 8000 Year Traditional 6000 Cloud 4000 2000 0 1 18 2 3 4 5 6 7 www. netcomlearning. com 8 9 10

Cloud Risks � Where’s My Data? � The Bad Divorce � Trust but Verify

Cloud Risks � Where’s My Data? � The Bad Divorce � Trust but Verify � “I thought you knew” � I didn’t think of that � Clarify � Consider � Expectations, Put it in Writing � Compatibility 19 www. netcomlearning. com

Where’s My Data? � In the information age your key asset is information. �

Where’s My Data? � In the information age your key asset is information. � Some information requires protection � (Credit Card Data, Student Records, SSN, etc…) � Your information could be anywhere in the world � You may loss access to your data (availability) � ISP failure � Service provider failure � Failure to pay (service provider stops access) 20 www. netcomlearning. com

The Bad Divorce � “Vendor Lock” � All relationships come to an end �

The Bad Divorce � “Vendor Lock” � All relationships come to an end � Let you down, had a breach, SLA performance etc… � The company fails/gets sold � Introductory pricing or it goes up over time � Transition � How � Lack to new vendor or in-source will you get your data back? of Portability between Paa. S Clouds � Example, something built for Google won’t work for Share. Point or Amazon � Get 21 a prenup – get it in the contract up front www. netcomlearning. com

Trust but Verify � Assurance � How � Not do you know they are

Trust but Verify � Assurance � How � Not do you know they are protecting your data? everyone is treated the same by service providers � Disclosure concerning security posture � 3 rd party independent verification (audit/assessment) � SAS 70 / SSAE 16 � Sys. Trust / Web. Trust � ISO 27001 Certification � Audit / Assessment � MOU/MOA & ISA 22 www. netcomlearning. com

“I thought you knew” � Cloud � This systems are typically more complex may

“I thought you knew” � Cloud � This systems are typically more complex may create a larger attack surface � Breach Notification � When do you want to know about a data breach? � (Data that you are legal obligated to protect) � Typical contracts give wide latitude for service providers � Actual verses possible breach � Timeliness of notification 23 www. netcomlearning. com

I didn’t think of that � Dependencies � Infrastructure – Internet � Authentication management

I didn’t think of that � Dependencies � Infrastructure – Internet � Authentication management (SSO) � Operational budget � Greater dependency on 3 rd parties � Other considerations � Complex legal issues � Multi-tenancy � Transborder data flow � Jurisdiction and Regulation � Support for Forensics 24 www. netcomlearning. com

Clarify � What do they mean by “Cloud” � Establish clear responsibilities and accountability

Clarify � What do they mean by “Cloud” � Establish clear responsibilities and accountability � Your expectations � Cost of compensating controls � What will happen with billing disputes � Will your data be in a multi-tenant environment � What controls will you have 25 www. netcomlearning. com

Consider � The reputation of the service provider � Track record of issues �

Consider � The reputation of the service provider � Track record of issues � Large or small, likelihood of change � Vendor ‘supply chain management’ issues � The reliability of the service or technology � Is the technology time tested � Competency of cloud provider � Typically you have no control over upgrades and changes � Training 26 for staff www. netcomlearning. com

Compatibility � When will they upgrade their service? � Will they be ready when

Compatibility � When will they upgrade their service? � Will they be ready when you are ready for an upgrade of dependent software � Will you be ready when they are ready to upgrade � Browser-based Risks and Risk Remediation � What software will be required on the client side? � Java � Flash � Active-X � Silverlight � HTML 27 5 www. netcomlearning. com

New attack vectors � Hypervisor complexity � Data leakage (multi-tenant environment) � Man in

New attack vectors � Hypervisor complexity � Data leakage (multi-tenant environment) � Man in the Middle � Browser vulnerabilities � Mobile device vulnerabilities 28 www. netcomlearning. com

Service Agreements � Service Level Agreement (SLA) � Some are predefined and non-negotiable �

Service Agreements � Service Level Agreement (SLA) � Some are predefined and non-negotiable � Some are negotiable (typically cost more) � Terms of Service � May cover privacy � Breach notification � Licensing � Acceptable use (What you can and can’t do) � Limitations on liability (Typically in the favor of the service provider) � Modifications of the terms of service (Do you want this? ) � Data ownership 29 www. netcomlearning. com

Traditional risks no matter where you go � Insider threat, � Instead � Access

Traditional risks no matter where you go � Insider threat, � Instead � Access � How of your staff it is their staff control can you control and monitor? � Authentication � Another � Data � Is logon or SSO sanitation your data really deleted? � Others? ? 30 www. netcomlearning. com

What to do? � Careful planning before engagement � Understand the technical aspects of

What to do? � Careful planning before engagement � Understand the technical aspects of the solution � Make sure it will meet your needs (security and privacy) � Maintain accountability � Define data location restrictions � Ensure laws and regulations are met � Make sure they can support electronic discovery and forensics � Follow 31 NIST and Cloud Security Alliance guidance www. netcomlearning. com

Remember to specify � Personnel (clear backgrounds) � Access control, account resource and management

Remember to specify � Personnel (clear backgrounds) � Access control, account resource and management � Availability, including SLA and dependencies � Problem & Incident reporting, notification and resolution � Disclosure agreements � Physical controls � Network boundary protection � Continuity, Backup and Recovery � Assurance levels � Independent audit or assessment 32 www. netcomlearning. com

Resources � Cloud � Security Alliance cloudsecurityalliance. org � ISACA: Cloud Computing Management Audit/Assurance

Resources � Cloud � Security Alliance cloudsecurityalliance. org � ISACA: Cloud Computing Management Audit/Assurance Program, 2010 � NIST SP 800 -144 (draft) � NIST SP 800 -145 � NIST SP 800 -146 (draft) � Federal Cloud Computing Strategy, February 2011 � Above the Clouds managing Risk in the World of Cloud Computing by Mc. Donald (978 -1 -84928 -031 -0) � Cloud Computing, Implementation, Management, and Security by Rittinghouse and Ransome (978 -1 -4398 -0680 -7) 33 www. netcomlearning. com